☆26Nov 16, 2023Updated 2 years ago
Alternatives and similar repositories for BYOTee-Build-Your-Own-TEEs
Users that are interested in BYOTee-Build-Your-Own-TEEs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SHERLOC: Secure and Holistic Control-Flow Violation Detection on Embedded Systems☆17Feb 21, 2024Updated 2 years ago
- This repo demonstrates the Return-to-Non-Secure (ret2ns) vulnerability on ARM Cortex-M TrustZone. It contains the attack and defense demo…☆34Oct 30, 2025Updated 4 months ago
- OP-TEE Trusted Applications vulnerable to memory corruption bugs.☆16Jul 3, 2020Updated 5 years ago
- Framework based on Partial Reconfiguration for chip characterization utilizing ring-oscillator PUFs☆13Apr 1, 2020Updated 5 years ago
- ☆28Mar 4, 2025Updated last year
- ☆10Dec 26, 2023Updated 2 years ago
- WaTZ: A Trusted WebAssembly Runtime Environment with Remote Attestation for TrustZone.☆32May 23, 2024Updated last year
- misc☆17May 26, 2015Updated 10 years ago
- Implementation of the Reusable Enclaves paper☆14Sep 25, 2023Updated 2 years ago
- Prototype system for the paper "OAT: Attesting Operation Integrity of Embedded Devices"(Oakland'20)☆16Nov 10, 2020Updated 5 years ago
- ARM CCA support for QEMU. Check wiki for instructions. https://github.com/Huawei/Huawei_CCA_RMM/wiki☆29Apr 15, 2023Updated 2 years ago
- oo7, a binary analysis tool to defend against Spectre vulnerabilities☆34Oct 16, 2020Updated 5 years ago
- ☆23Jun 23, 2023Updated 2 years ago
- ☆35Jul 23, 2023Updated 2 years ago
- AMD SEV-SNP rust utils☆16May 13, 2025Updated 10 months ago
- ☆21Sep 7, 2022Updated 3 years ago
- ☆13Oct 8, 2021Updated 4 years ago
- ☆42Feb 26, 2023Updated 3 years ago
- Code repository for the research paper "A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP"☆13May 17, 2022Updated 3 years ago
- SyzTrust's main repository. Start here to install.☆19Feb 29, 2024Updated 2 years ago
- Framework for building transparent memory encryption and authentication solutions☆27Jun 19, 2018Updated 7 years ago
- Using Malicious #VC Interrupts to Break AMD SEV-SNP (IEEE S&P 2024)☆26Apr 22, 2024Updated last year
- ☆14Dec 30, 2021Updated 4 years ago
- ☆12Apr 19, 2023Updated 2 years ago
- RISC-V Security HC admin repo☆18Jan 7, 2025Updated last year
- Group administration repository for Tech: IOPMP Task Group☆13Dec 19, 2024Updated last year
- A behavioural cache model for analysing the cache behaviour under side-channel attack.☆28Jun 25, 2025Updated 9 months ago
- Proof of concept code for DeepSteal (SP'22) Machine Learning model extraction (weight stealing) with memory side channel☆13Jun 22, 2023Updated 2 years ago
- Commodity Obfuscation Engine for Intel SGX☆20Jul 21, 2019Updated 6 years ago
- Trust Domain Extensions (TDX) is introducing new, architectural elements to help deploy hardware-isolated, virtual machines (VMs) called …☆100Aug 13, 2025Updated 7 months ago
- Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture can Leak Private Data☆20Oct 13, 2022Updated 3 years ago
- Bitfiltrator: A general approach for reverse-engineering Xilinx bitstream formats☆49Apr 8, 2023Updated 2 years ago
- ☆25Mar 1, 2023Updated 3 years ago
- A migration for the page table entry based side-channel attack agains SGX enclaves.☆19Feb 10, 2025Updated last year
- Preventing code-reuse attacks by stopping code pointer leakages☆37Feb 24, 2016Updated 10 years ago
- A general cross-architecture C/C++ hotpatch solution using customized userspace eBPF runtime. One patch release can fix the same vulnera…☆30Nov 4, 2023Updated 2 years ago
- Framework for FPGA-accelerated Middlebox Development☆49Feb 18, 2023Updated 3 years ago
- ☆21Jun 17, 2022Updated 3 years ago
- Data oblivious ISA prototyped on the RISC-V BOOM processor.☆23Aug 22, 2022Updated 3 years ago