Practical and Efficient in-TEE Verification of Privacy Compliance
☆46Jan 10, 2025Updated last year
Alternatives and similar repositories for Deflection
Users that are interested in Deflection are comparing it to the libraries listed below
Sorting:
- Proof of Being Fogotten (PoBF) and PoBF-Compliant Framework (PoCF) prototypes.☆22Aug 7, 2023Updated 2 years ago
- COIN Attacks: on Insecurity of Enclave Untrusted Interfaces in SGX - ASPLOS 2020☆26Dec 12, 2022Updated 3 years ago
- ☆32Jul 11, 2022Updated 3 years ago
- Ratel - a new framework for instruction-level interposition on enclaved applications☆25Dec 14, 2022Updated 3 years ago
- A Compiler-based System for Secure Memory Instrumentation and Execution in Enclaves☆29Feb 25, 2021Updated 5 years ago
- Resillent Control-Flow Attestation☆13Sep 30, 2021Updated 4 years ago
- Jinzhao Disk (JinDisk) is a log-structured secure block device for TEEs. This repo is JinDisk's Linux version.☆36May 26, 2023Updated 2 years ago
- WASEM - a general symbolic execution framework for WebAssembly (WASM) binaries☆18Sep 30, 2024Updated last year
- Implementation of the Reusable Enclaves paper☆14Sep 25, 2023Updated 2 years ago
- The nbench benchmark ported to SGX.☆14Aug 4, 2019Updated 6 years ago
- A POSIX Filesystem for Enclaves with a Mechanized Safety Proof☆17Sep 20, 2019Updated 6 years ago
- ☆14Oct 27, 2021Updated 4 years ago
- PoC exploits against various SGX enclaves☆14May 19, 2022Updated 3 years ago
- SwornDisk是一个面向可信执行环境的、基于日志结构的安全块设备(全国大学生操作系统比赛2022)☆24Aug 14, 2022Updated 3 years ago
- ☆31Jun 14, 2023Updated 2 years ago
- LLVM Implementation of different ShadowStack schemes for x86_64☆39May 2, 2020Updated 5 years ago
- Low level attester and verifier drivers for multiple TEEs☆26May 30, 2024Updated last year
- ☆41Feb 26, 2023Updated 3 years ago
- ☆94Jan 6, 2026Updated last month
- A curated list of SGX code and resources.☆246May 27, 2024Updated last year
- 南开大学区块链课程作业与课件☆18Nov 1, 2022Updated 3 years ago
- LaTeX package to Do The Right Thing☆13Sep 8, 2021Updated 4 years ago
- ☆10Dec 26, 2023Updated 2 years ago
- Proof-of-Concept of the Frontal Attack☆11Jul 6, 2023Updated 2 years ago
- SGXRay: a bounded verifier for Intel SGX enclaves☆13Sep 10, 2021Updated 4 years ago
- P4Control: Line-Rate Cross-Host Attack Prevention via In-Network Information Flow Control Enabled by Programmable Switches and eBPF☆11May 20, 2024Updated last year
- A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes☆45Sep 2, 2023Updated 2 years ago
- An Open and Cross-platform Trusted Execution Environment.☆150Sep 27, 2024Updated last year
- Compiler-based tool that protects Intel SGX applications against controlled-channel attacks☆26May 23, 2017Updated 8 years ago
- Revise Spark written in Rust (Native Spark or Vega) to a secure one☆11Apr 7, 2023Updated 2 years ago
- LFSC Proof Checker☆11Sep 14, 2023Updated 2 years ago
- TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.☆14May 26, 2022Updated 3 years ago
- ☆10Feb 24, 2023Updated 3 years ago
- Code Repository for DataGuard Framework☆13Jul 11, 2023Updated 2 years ago
- Open sourced implementation of a prototype for Hyperledger Fabric chaincode execution with OP-TEE. This work is part of the master thesis…☆14Sep 10, 2019Updated 6 years ago
- AMD SEV-SNP rust utils☆16May 13, 2025Updated 9 months ago
- Pointer analysis prototype (currently including anderson, steensgard).☆16Dec 20, 2021Updated 4 years ago
- Confidential Containers Shim Firmware☆120Updated this week
- Example on how to use the Intel SGX implementation of AES-GCM☆29Mar 13, 2019Updated 6 years ago