TF-RMM / tf-rmmLinks
Reference implementation of Arm-CCA RMM specification
☆52Updated this week
Alternatives and similar repositories for tf-rmm
Users that are interested in tf-rmm are comparing it to the libraries listed below
Sorting:
- Protecting Accelerator Execution with Arm Confidential Computing Architecture (USENIX Security 2024)☆26Updated last year
- ☆22Updated last year
- ☆22Updated 2 years ago
- ☆32Updated 2 years ago
- Group administration repository for Tech: IOPMP Task Group☆13Updated 6 months ago
- This repo holds the work area and revisions of the non-ISA specification created by the RISC-V AP-TEE TG. This specification defines the …☆56Updated last month
- ☆22Updated 3 months ago
- ☆34Updated last year
- This is the main repo for Penglai.☆69Updated last year
- Penglai Enclave is an open-sourced, secure and scalable TEE system for RISC-V.☆140Updated 3 months ago
- RISC-V Security HC admin repo☆18Updated 5 months ago
- A rust implementation for DMTF SPDM protocol to support Confidential Computing☆34Updated 2 weeks ago
- A minimal bootstrap scheme for fast boot of serverless microVMs with AMD Secure Encrypted Virtualization (SEV)☆13Updated last year
- ☆88Updated this week
- ☆18Updated 2 years ago
- An on-device confidential computing platform☆116Updated last week
- The main repo of Penglai Enclave based on RISC-V Trapped Virtual Memory (TVM).☆39Updated 2 years ago
- ☆23Updated 3 weeks ago
- Microscope: Enabling Microarchitectural Replay Attacks☆19Updated 4 years ago
- Hands on with side-channels: a tutorial on covert-channels built using shared CPU resources. Three different covert-channel implementatio…☆48Updated 5 years ago
- Trust Domain Extensions (TDX) is introducing new, architectural elements to help deploy hardware-isolated, virtual machines (VMs) called …☆64Updated last month
- The MIT Sanctum processor top-level project☆29Updated 5 years ago
- ☆38Updated 2 years ago
- Risc-V hypervisor for TEE development☆117Updated last week
- Streamline Covert Channel Attack (presented in ASPLOS'21)☆20Updated 4 years ago
- The artifact for SecSMT paper -- Usenix Security 2022☆27Updated 2 years ago
- A formally verified security module for AMD confidential VMs☆47Updated 2 weeks ago
- ☆72Updated last year
- Linux kernel source tree☆28Updated last week
- ☆15Updated last year