NVIDIA / gpu-admin-tools
GPU Admin Tools. Includes Confidential Computing controls for H100, and other functionality
☆19Updated 2 months ago
Alternatives and similar repositories for gpu-admin-tools:
Users that are interested in gpu-admin-tools are comparing it to the libraries listed below
- Trust Domain Extensions (TDX) is introducing new, architectural elements to help deploy hardware-isolated, virtual machines (VMs) called …☆53Updated 2 months ago
- ☆15Updated this week
- The implementation of the 'vSGX: Virtualizing SGX Enclaves on AMD SEV' paper☆52Updated last year
- ☆27Updated last year
- Linux kernel source tree☆26Updated this week
- ☆25Updated last week
- ☆21Updated 2 years ago
- ☆85Updated this week
- Implementation of the Reusable Enclaves paper☆12Updated last year
- A minimal bootstrap scheme for fast boot of serverless microVMs with AMD Secure Encrypted Virtualization (SEV)☆10Updated last year
- Microscope: Enabling Microarchitectural Replay Attacks☆18Updated 4 years ago
- ☆23Updated 3 months ago
- rkt-io Library OS for running Linux applications inside of Intel SGX enclaves☆30Updated 3 years ago
- Proof of Being Fogotten (PoBF) and PoBF-Compliant Framework (PoCF) prototypes.☆20Updated last year
- A library OS for Linux multi-process applications, with Intel TDX support (experimental)☆29Updated 4 months ago
- Protecting Accelerator Execution with Arm Confidential Computing Architecture (USENIX Security 2024)☆26Updated last year
- ☆23Updated this week
- The nbench benchmark ported to SGX.☆13Updated 5 years ago
- Calculate AMD SEV/SEV-ES/SEV-SNP measurement for confidential computing☆60Updated 8 months ago
- ☆70Updated 2 years ago
- AMD SEV Tool☆81Updated last year
- ☆30Updated 2 years ago
- ☆70Updated last year
- Compiler-based tool that protects Intel SGX applications against controlled-channel attacks☆27Updated 7 years ago
- Trusted I/O Paths for SGX Enclaves☆16Updated 4 years ago
- ☆22Updated last year
- Documentation related to Intel's Confidential Computing offerings☆16Updated 3 weeks ago
- A rust implementation for DMTF SPDM protocol to support Confidential Computing☆25Updated last week
- Using Malicious #VC Interrupts to Break AMD SEV-SNP (IEEE S&P 2024)☆24Updated 9 months ago
- ☆36Updated this week