Huawei / Huawei_CCA_QEMUView external linksLinks
ARM CCA support for QEMU. Check wiki for instructions. https://github.com/Huawei/Huawei_CCA_RMM/wiki
☆28Apr 15, 2023Updated 2 years ago
Alternatives and similar repositories for Huawei_CCA_QEMU
Users that are interested in Huawei_CCA_QEMU are comparing it to the libraries listed below
Sorting:
- Forked from tf-rmm@trustedfirmware, support QEMU platform. Check wiki for instruction. https://github.com/Huawei/Huawei_CCA_RMM/wiki☆21Apr 15, 2023Updated 2 years ago
- Protecting Accelerator Execution with Arm Confidential Computing Architecture (USENIX Security 2024)☆26Dec 11, 2023Updated 2 years ago
- ☆14Aug 17, 2024Updated last year
- ☆34Nov 7, 2022Updated 3 years ago
- This repository contains the hardware, software, and OS support for the Programmable Hardware Monitor (PHMon).☆27Aug 10, 2020Updated 5 years ago
- Using Malicious #VC Interrupts to Break AMD SEV-SNP (IEEE S&P 2024)☆26Apr 22, 2024Updated last year
- Linux kernel source tree☆10Oct 11, 2017Updated 8 years ago
- ☆10Dec 26, 2023Updated 2 years ago
- Fuzzing Secure Monitor Implementations☆19Aug 3, 2024Updated last year
- ☆14Nov 11, 2025Updated 3 months ago
- ☆14Mar 10, 2025Updated 11 months ago
- A simple Mali 6xx/7xx register interface model that doesn't do any rendering.☆13Jan 29, 2016Updated 10 years ago
- Implementation of the Arm CCA attestation token in Rust☆13Sep 23, 2025Updated 4 months ago
- This repository contains the source code related to the research paper titled "Temporal System Call Specialization for Attack Surface Red…☆38Nov 14, 2024Updated last year
- ☆12Apr 9, 2022Updated 3 years ago
- ☆14Jan 5, 2024Updated 2 years ago
- ☆13Aug 18, 2025Updated 5 months ago
- ☆14May 19, 2019Updated 6 years ago
- ☆14Dec 26, 2022Updated 3 years ago
- Group administration repository for Tech: IOPMP Task Group☆13Dec 19, 2024Updated last year
- ☆26Nov 16, 2023Updated 2 years ago
- An on-device confidential computing platform☆134Dec 18, 2025Updated last month
- WaTZ: A Trusted WebAssembly Runtime Environment with Remote Attestation for TrustZone.☆32May 23, 2024Updated last year
- Shielded Enclaves for Cloud FPGAs☆15Nov 24, 2021Updated 4 years ago
- Implementation of the Reusable Enclaves paper☆14Sep 25, 2023Updated 2 years ago
- ☆16Nov 13, 2023Updated 2 years ago
- Memory Tagging ISA extension that can be used by software to enforce memory tag checks on memory loads and stores☆26Dec 18, 2025Updated last month
- ☆14Oct 27, 2021Updated 4 years ago
- A rust implementation for DMTF SPDM protocol to support Confidential Computing☆50Updated this week
- ☆13Apr 21, 2024Updated last year
- kvm hypervisor☆16Dec 20, 2022Updated 3 years ago
- ☆40Feb 26, 2023Updated 2 years ago
- SwornDisk是一个面向可信执行环境的、基于日志结构的安全块设备(全国大学生操作系统比赛2022)☆24Aug 14, 2022Updated 3 years ago
- Gem5 with PCI Express integrated.☆23Sep 29, 2018Updated 7 years ago
- Trusted I/O Paths for SGX Enclaves☆18Apr 30, 2020Updated 5 years ago
- A simple /dev/mem dumper for Linux☆19Aug 17, 2022Updated 3 years ago
- FunSeeker: Binary Function Identification Tool☆26Dec 23, 2023Updated 2 years ago
- LID-DS is an intrusion detection data simulation framework.☆55May 15, 2025Updated 8 months ago
- ELISA: Exit-Less, Isolated, and Shared Access for Virtual Machines☆21Nov 1, 2025Updated 3 months ago