AMDESE / qemuLinks
QEMU fork
☆22Updated this week
Alternatives and similar repositories for qemu
Users that are interested in qemu are comparing it to the libraries listed below
Sorting:
- ☆91Updated last week
- Linux kernel source tree☆29Updated this week
- Calculate AMD SEV/SEV-ES/SEV-SNP measurement for confidential computing☆69Updated last week
- Trust Domain Extensions (TDX) is introducing new, architectural elements to help deploy hardware-isolated, virtual machines (VMs) called …☆78Updated last month
- ☆41Updated this week
- Linux SVSM (Secure VM Service Module) for secure x86 virtualization in Rust☆137Updated last year
- COCONUT-SVSM☆177Updated this week
- ☆39Updated last month
- AMD SEV Tool☆87Updated 2 years ago
- A library OS for Linux multi-process applications, with Intel TDX support (experimental)☆40Updated 3 weeks ago
- Protecting Accelerator Execution with Arm Confidential Computing Architecture (USENIX Security 2024)☆26Updated last year
- AMD Secure Encrypted Virtualization☆344Updated 6 months ago
- Reference implementation of Arm-CCA RMM specification☆62Updated last week
- Documentation related to Intel's Confidential Computing offerings☆18Updated 2 months ago
- ☆33Updated 6 months ago
- ☆35Updated 3 months ago
- ☆23Updated 3 years ago
- ☆58Updated 6 months ago
- ☆26Updated last month
- A rust implementation for DMTF SPDM protocol to support Confidential Computing☆39Updated this week
- ☆22Updated 2 years ago
- Tools, scripts, and configuration files necessary to demonstrate an end-to-end remote attestation example with SEV-SNP.☆57Updated last year
- ☆38Updated 2 weeks ago
- ☆79Updated 2 years ago
- Confidential Containers Shim Firmware☆114Updated 3 weeks ago
- Rust library for AMD SEV and SEV-SNP☆120Updated this week
- A minimal bootstrap scheme for fast boot of serverless microVMs with AMD Secure Encrypted Virtualization (SEV)☆14Updated last year
- ☆41Updated 3 weeks ago
- Confidential Computing Consortium Governance Documents☆79Updated this week
- Ratel - a new framework for instruction-level interposition on enclaved applications☆23Updated 2 years ago