☆15Jan 5, 2024Updated 2 years ago
Alternatives and similar repositories for NDSS24-CAGE
Users that are interested in NDSS24-CAGE are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The artifact for NDSS '25 paper "ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environmen…☆15Oct 16, 2025Updated 5 months ago
- Protecting Accelerator Execution with Arm Confidential Computing Architecture (USENIX Security 2024)☆27Dec 11, 2023Updated 2 years ago
- ☆22Jul 16, 2022Updated 3 years ago
- Open-source code and data for ShadowNet(S&P Oakland'23)☆12Mar 11, 2024Updated 2 years ago
- ☆22Aug 23, 2022Updated 3 years ago
- ELISA: Exit-Less, Isolated, and Shared Access for Virtual Machines☆22Nov 1, 2025Updated 4 months ago
- ☆34Nov 7, 2022Updated 3 years ago
- ☆35Jul 23, 2023Updated 2 years ago
- Hypervisor from scratch in linux☆13May 8, 2022Updated 3 years ago
- pKVM POC for x86☆32Updated this week
- icml24☆14Feb 24, 2025Updated last year
- TAOISM: A TEE-based Confidential Heterogeneous Deployment Framework for DNN Models☆52Apr 11, 2024Updated last year
- Using Malicious #VC Interrupts to Break AMD SEV-SNP (IEEE S&P 2024)☆26Apr 22, 2024Updated last year
- ☆28Mar 4, 2025Updated last year
- ☆11Jun 10, 2024Updated last year
- A library OS for Linux multi-process applications, with Intel TDX support (experimental)☆47Updated this week
- Reference implementation of Arm-CCA RMM specification☆74Mar 17, 2026Updated last week
- Code for paper: "RemovalNet: DNN model fingerprinting removal attack", IEEE TDSC 2023.☆10Nov 27, 2023Updated 2 years ago
- ☆25Jun 17, 2025Updated 9 months ago
- ☆14Nov 11, 2025Updated 4 months ago
- Ymir: The Type-1 Hypervisor.☆58Jun 18, 2025Updated 9 months ago
- Matrix multiplication on the NPU inside RK3588☆17Jun 27, 2024Updated last year
- Multiplication using AVX512 and AVX512IFMA instructions☆23Nov 9, 2015Updated 10 years ago
- Cache side-channel attack AES android☆13Sep 6, 2017Updated 8 years ago
- Enabling Secure Boot on the RK3588 family of SoCs☆64Jan 8, 2025Updated last year
- ☆16May 22, 2023Updated 2 years ago
- RKTools☆18Oct 26, 2021Updated 4 years ago
- ☆13Feb 27, 2024Updated 2 years ago
- Trusted Execution Environment examples leveraging attestations on Azure☆15Apr 20, 2020Updated 5 years ago
- Artefacts for: "VMScape: Exposing and Exploiting Incomplete Branch Predictor Isolation in Cloud Environments"☆37Oct 17, 2025Updated 5 months ago
- OpenCCA: An Open Framework to Enable Arm CCA Research☆21Sep 10, 2025Updated 6 months ago
- [CVPR'24] LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning☆15Jan 15, 2025Updated last year
- Virtual I/O acceleration technologies for KVM☆15Sep 17, 2013Updated 12 years ago
- ☆18Apr 17, 2019Updated 6 years ago
- A standalone CXL-enabled system simulator.☆20Jan 10, 2026Updated 2 months ago
- Vivado in GitLab-Runner for GitLab CI/CD☆10Oct 27, 2022Updated 3 years ago
- ☆19Jan 8, 2019Updated 7 years ago
- Run large AI models in TEE environment☆14Sep 10, 2024Updated last year
- Normalized network traffic entropy-based DDoS detection in P4☆13May 9, 2024Updated last year