☆34Nov 7, 2022Updated 3 years ago
Alternatives and similar repositories for CCS22-StrongBox
Users that are interested in CCS22-StrongBox are comparing it to the libraries listed below
Sorting:
- ☆35Jul 23, 2023Updated 2 years ago
- Hardware-assisted Dynamic Information Flow Tracking for Runtime Protection on RISC-V☆11Oct 16, 2023Updated 2 years ago
- The artifact for NDSS '25 paper "ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environmen…☆15Oct 16, 2025Updated 5 months ago
- Protecting Accelerator Execution with Arm Confidential Computing Architecture (USENIX Security 2024)☆27Dec 11, 2023Updated 2 years ago
- ☆13Apr 9, 2022Updated 3 years ago
- ☆15Jan 5, 2024Updated 2 years ago
- ☆22Jul 16, 2022Updated 3 years ago
- ☆16Nov 13, 2023Updated 2 years ago
- PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability, ACM CCS'22☆24Nov 11, 2024Updated last year
- An on-device confidential computing platform☆136Dec 18, 2025Updated 3 months ago
- ☆14Nov 11, 2025Updated 4 months ago
- Minimal RISC Extensions for Isolated Execution☆54Jul 11, 2019Updated 6 years ago
- ☆11Jun 10, 2024Updated last year
- runs several layers of a deep learning model in TrustZone☆95Aug 8, 2024Updated last year
- Using Malicious #VC Interrupts to Break AMD SEV-SNP (IEEE S&P 2024)☆26Apr 22, 2024Updated last year
- TAOISM: A TEE-based Confidential Heterogeneous Deployment Framework for DNN Models☆51Apr 11, 2024Updated last year
- ARM CCA support for QEMU. Check wiki for instructions. https://github.com/Huawei/Huawei_CCA_RMM/wiki☆29Apr 15, 2023Updated 2 years ago
- ELISA: Exit-Less, Isolated, and Shared Access for Virtual Machines☆21Nov 1, 2025Updated 4 months ago
- ☆22Aug 23, 2022Updated 3 years ago
- Trust Domain Extensions (TDX) is introducing new, architectural elements to help deploy hardware-isolated, virtual machines (VMs) called …☆99Aug 13, 2025Updated 7 months ago
- ☆31Jul 11, 2022Updated 3 years ago
- Nailgun attack on ARM devices.☆165May 13, 2021Updated 4 years ago
- SwornDisk是一个面向可信执行环境的、基于日志结构的安全块设备(全国大学生操作系统比赛2022)☆24Aug 14, 2022Updated 3 years ago
- ☆20Oct 24, 2024Updated last year
- Open-source release for MemSentry (EuroSys'17)☆47May 5, 2021Updated 4 years ago
- ☆77Apr 18, 2025Updated 11 months ago
- A Secure Version of DATAVIEW using SGX techniques.☆10Jul 6, 2021Updated 4 years ago
- ☆20Mar 10, 2022Updated 4 years ago
- ☆29Dec 16, 2022Updated 3 years ago
- Tests for verifying compliance of RMM implementations☆21Sep 22, 2025Updated 5 months ago
- Implementation of the Reusable Enclaves paper☆14Sep 25, 2023Updated 2 years ago
- ☆10Dec 26, 2023Updated 2 years ago
- System Audit Architecture with High Event Coverage and Synchronous Log Availability☆19Nov 27, 2024Updated last year
- Intra-Unikernel Isolation with Intel Memory Protection Keys☆13Mar 18, 2020Updated 6 years ago
- Ancillary open source software to support confidential computing on NVIDIA GPUs☆306Updated this week
- PFI: Prompt Flow Integrity to Prevent Privilege Escalation in LLM Agents☆27Mar 26, 2025Updated 11 months ago
- Benchmark to test different stop the exploit mitigations☆18Jan 8, 2019Updated 7 years ago
- Linux SVSM (Secure VM Service Module) for secure x86 virtualization in Rust☆10Sep 7, 2023Updated 2 years ago
- ☆14Aug 17, 2024Updated last year