Forked from tf-rmm@trustedfirmware, support QEMU platform. Check wiki for instruction. https://github.com/Huawei/Huawei_CCA_RMM/wiki
☆21Apr 15, 2023Updated 2 years ago
Alternatives and similar repositories for Huawei_CCA_RMM
Users that are interested in Huawei_CCA_RMM are comparing it to the libraries listed below
Sorting:
- ARM CCA support for QEMU. Check wiki for instructions. https://github.com/Huawei/Huawei_CCA_RMM/wiki☆28Apr 15, 2023Updated 2 years ago
- ☆13Apr 9, 2022Updated 3 years ago
- ☆14Aug 17, 2024Updated last year
- Tests for verifying compliance of RMM implementations☆21Sep 22, 2025Updated 5 months ago
- caijiqhx notes☆17Oct 26, 2024Updated last year
- Reference implementation of Arm-CCA RMM specification☆71Updated this week
- ☆35Jul 23, 2023Updated 2 years ago
- ☆20Mar 10, 2022Updated 3 years ago
- Using Malicious #VC Interrupts to Break AMD SEV-SNP (IEEE S&P 2024)☆26Apr 22, 2024Updated last year
- Linux kernel source tree☆10Oct 11, 2017Updated 8 years ago
- Protecting Accelerator Execution with Arm Confidential Computing Architecture (USENIX Security 2024)☆27Dec 11, 2023Updated 2 years ago
- A simple Mali 6xx/7xx register interface model that doesn't do any rendering.☆13Jan 29, 2016Updated 10 years ago
- Implementation of the Arm CCA attestation token in Rust☆13Sep 23, 2025Updated 5 months ago
- ☆14Nov 11, 2025Updated 3 months ago
- ☆10Dec 26, 2023Updated 2 years ago
- Linux SVSM (Secure VM Service Module) for secure x86 virtualization in Rust☆10Sep 7, 2023Updated 2 years ago
- FortifyPatch: Towards Tamper-resistant Live Patching in Linux-based Hypervisor.☆17Sep 22, 2025Updated 5 months ago
- ☆13Aug 18, 2025Updated 6 months ago
- ☆15Jan 5, 2024Updated 2 years ago
- A TEE programming framework based on trusted functions.☆14Mar 23, 2021Updated 4 years ago
- Artifacts for our ShowTime paper (AsiaCCS '23), including distinguishing cache hits and misses with the human eye.☆14Jul 21, 2023Updated 2 years ago
- An on-device confidential computing platform☆133Dec 18, 2025Updated 2 months ago
- Implementation of the Reusable Enclaves paper☆14Sep 25, 2023Updated 2 years ago
- ☆16Nov 13, 2023Updated 2 years ago
- Memory Tagging ISA extension that can be used by software to enforce memory tag checks on memory loads and stores☆28Dec 18, 2025Updated 2 months ago
- A rust implementation for DMTF SPDM protocol to support Confidential Computing☆50Feb 23, 2026Updated last week
- ☆34Nov 7, 2022Updated 3 years ago
- A container engine from scratch in C language, without any LXC or Docker☆18Jun 17, 2022Updated 3 years ago
- Run integrity protected workloads in a hardware based Trusted Execution Environment.☆43Feb 17, 2026Updated 2 weeks ago
- Meeting materials☆19Updated this week
- FunSeeker: Binary Function Identification Tool☆26Dec 23, 2023Updated 2 years ago
- Trusted I/O Paths for SGX Enclaves☆18Apr 30, 2020Updated 5 years ago
- This repository contains the source code related to the research paper titled "Temporal System Call Specialization for Attack Surface Red…☆38Nov 14, 2024Updated last year
- ☆30Updated this week
- Website for Research Artifacts from the Security Community☆31Feb 26, 2026Updated last week
- ☆21Apr 15, 2022Updated 3 years ago
- This repository contains the hardware, software, and OS support for the Programmable Hardware Monitor (PHMon).☆27Aug 10, 2020Updated 5 years ago
- ☆19Jan 8, 2019Updated 7 years ago
- TEE hardware - based on the chipyard repository - hardware to accelerate TEE☆24Dec 16, 2022Updated 3 years ago