Penglai-Enclave / Penglai-Enclave-sPMP
Penglai Enclave is an open-sourced, secure and scalable TEE system for RISC-V.
☆140Updated 2 months ago
Alternatives and similar repositories for Penglai-Enclave-sPMP:
Users that are interested in Penglai-Enclave-sPMP are comparing it to the libraries listed below
- The main repo of Penglai Enclave based on RISC-V Trapped Virtual Memory (TVM).☆39Updated last year
- This is the main repo for Penglai.☆69Updated last year
- ☆38Updated 2 years ago
- ☆21Updated 2 years ago
- ☆18Updated 2 years ago
- ☆23Updated 2 months ago
- Protecting Accelerator Execution with Arm Confidential Computing Architecture (USENIX Security 2024)☆26Updated last year
- ☆71Updated last year
- Trusted I/O Paths for SGX Enclaves☆16Updated 5 years ago
- ☆33Updated last year
- This repo holds the work area and revisions of the non-ISA specification created by the RISC-V AP-TEE TG. This specification defines the …☆55Updated last month
- ☆31Updated 2 years ago
- Reference implementation of Arm-CCA RMM specification☆51Updated this week
- The implementation of the 'vSGX: Virtualizing SGX Enclaves on AMD SEV' paper☆54Updated last year
- ☆15Updated last year
- The repo contains the SPMP architectural specification, which includes capabilities like access control of read/write/execute requests by…☆16Updated last week
- The MIT Sanctum processor top-level project☆28Updated 5 years ago
- Trusted in-memory key-value store based on ShieldStore which is published in EuroSys 2019☆37Updated 2 years ago
- HyperBench: A Benchmark Suite for Virtualization Capabilities☆29Updated 5 years ago
- ☆22Updated last year
- ☆30Updated 2 years ago
- ☆55Updated 3 weeks ago
- Risc-V hypervisor for TEE development☆113Updated 2 weeks ago
- ☆34Updated 2 years ago
- Virtualisation platform using CHERI for isolation and sharing☆37Updated 11 months ago
- caijiqhx notes☆17Updated 6 months ago
- Trust Domain Extensions (TDX) is introducing new, architectural elements to help deploy hardware-isolated, virtual machines (VMs) called …☆59Updated 2 weeks ago
- Microscope: Enabling Microarchitectural Replay Attacks☆19Updated 4 years ago
- Hands on with side-channels: a tutorial on covert-channels built using shared CPU resources. Three different covert-channel implementatio…☆46Updated 5 years ago
- ☆19Updated this week