PSPReverse / amd-sev-migration-attack
☆25Updated 3 years ago
Alternatives and similar repositories for amd-sev-migration-attack:
Users that are interested in amd-sev-migration-attack are comparing it to the libraries listed below
- AMD SEV Tool☆83Updated last year
- ☆36Updated this week
- Administrative utility for SEV-SNP☆30Updated 3 weeks ago
- ☆70Updated 2 years ago
- Linux kernel source tree☆26Updated last week
- Virtualisation platform using CHERI for isolation and sharing☆37Updated 9 months ago
- Using Malicious #VC Interrupts to Break AMD SEV-SNP (IEEE S&P 2024)☆24Updated 11 months ago
- ☆40Updated last month
- Tool to Analyze Speculative Execution Attacks and Mitigations☆54Updated 3 years ago
- Administrative utility for AMD SEV☆53Updated 2 weeks ago
- QEMU fork☆22Updated 2 weeks ago
- Calculate AMD SEV/SEV-ES/SEV-SNP measurement for confidential computing☆60Updated 9 months ago
- ☆96Updated last year
- ☆85Updated this week
- QARMA block cipher in C☆27Updated 2 years ago
- The Intel® Software Guard Extensions Enclave Memory Manager is a module designed to manage dynamic memory within an SGX runtime.☆25Updated 2 weeks ago
- A tool to enable fuzzing for Spectre vulnerabilities☆30Updated 5 years ago
- The implementation of the 'vSGX: Virtualizing SGX Enclaves on AMD SEV' paper☆54Updated last year
- A CLI tool for interacting with SEV-SNP guest environment☆58Updated last month
- Artifacts for our ShowTime paper (AsiaCCS '23), including distinguishing cache hits and misses with the human eye.☆12Updated last year
- Microscope: Enabling Microarchitectural Replay Attacks☆19Updated 4 years ago
- ☆16Updated this week
- ☆29Updated this week
- Kernel Address Isolation to have Side-channels Efficiently Removed☆219Updated 3 years ago
- Tor anonymity network for SGX☆46Updated 6 years ago
- Linux Security Hardening for Confidential Compute☆66Updated 6 months ago
- ☆43Updated 6 years ago
- Framework for building transparent memory encryption and authentication solutions☆27Updated 6 years ago
- Medusa Repository: Transynther tool and Medusa Attack☆21Updated 4 years ago
- Tests for verifying compliance of RMM implementations☆18Updated last month