☆29Dec 16, 2022Updated 3 years ago
Alternatives and similar repositories for RT-TEE
Users that are interested in RT-TEE are comparing it to the libraries listed below
Sorting:
- ☆41Feb 26, 2023Updated 3 years ago
- Prototype system for the paper "OAT: Attesting Operation Integrity of Embedded Devices"(Oakland'20)☆16Nov 10, 2020Updated 5 years ago
- -☆11Dec 18, 2022Updated 3 years ago
- ☆35Jul 23, 2023Updated 2 years ago
- runs several layers of a deep learning model in TrustZone☆94Aug 8, 2024Updated last year
- A general cross-architecture C/C++ hotpatch solution using customized userspace eBPF runtime. One patch release can fix the same vulnera…☆30Nov 4, 2023Updated 2 years ago
- The server part of the SafeKeeper project.☆18Jul 12, 2018Updated 7 years ago
- ☆21Sep 7, 2022Updated 3 years ago
- ☆34Nov 7, 2022Updated 3 years ago
- RISC-V Tools (GNU Toolchain, ISA Simulator, Tests)☆23May 9, 2019Updated 6 years ago
- ☆22Aug 23, 2022Updated 3 years ago
- Protecting Accelerator Execution with Arm Confidential Computing Architecture (USENIX Security 2024)☆27Dec 11, 2023Updated 2 years ago
- ☆14Nov 11, 2025Updated 3 months ago
- ☆10Dec 26, 2023Updated 2 years ago
- System Audit Architecture with High Event Coverage and Synchronous Log Availability☆18Nov 27, 2024Updated last year
- ☆14Dec 27, 2020Updated 5 years ago
- PrivacyGuard is a platform that combines blockchain smart contract and TEE to enable transparent enforcement of private data computation …☆29Mar 20, 2022Updated 3 years ago
- ☆11Apr 7, 2022Updated 3 years ago
- ☆12Dec 22, 2023Updated 2 years ago
- WaTZ: A Trusted WebAssembly Runtime Environment with Remote Attestation for TrustZone.☆32May 23, 2024Updated last year
- ☆14Dec 10, 2021Updated 4 years ago
- ☆14Aug 17, 2024Updated last year
- On the TOCTOU Problem in Remote Attestation☆15Jun 4, 2024Updated last year
- Implementation of the Reusable Enclaves paper☆14Sep 25, 2023Updated 2 years ago
- OP-TEE Trusted Applications vulnerable to memory corruption bugs.☆16Jul 3, 2020Updated 5 years ago
- Shielded Enclaves for Cloud FPGAs☆15Nov 24, 2021Updated 4 years ago
- ☆22Jul 16, 2022Updated 3 years ago
- Tests for verifying compliance of RMM implementations☆21Sep 22, 2025Updated 5 months ago
- SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice☆16May 19, 2025Updated 9 months ago
- Trusted Gateway: hardened router architecture with ARM TrustZone protected firewall, routing, and NIC modules.☆15Jul 19, 2022Updated 3 years ago
- Prebuilt OP-TEE 3.15 Binaries for QEMUv8 and Run x-test☆17Aug 21, 2022Updated 3 years ago
- SwornDisk是一个面向可信执行环境的、基于日志结构的安全块设备(全国大学生操作系统比赛2022)☆24Aug 14, 2022Updated 3 years ago
- Several examples of anomaly detection algorithms for time series data.☆16Nov 20, 2024Updated last year
- Accompanying material for C-FLAT: Control Flow Attestation for Embedded Systems Software☆45Aug 12, 2016Updated 9 years ago
- Privacy-preserving Federated Learning with Trusted Execution Environments☆74Jul 10, 2025Updated 7 months ago
- The published code repo for the Cortex-M SoK paper.☆27Feb 5, 2026Updated last month
- SHERLOC: Secure and Holistic Control-Flow Violation Detection on Embedded Systems☆17Feb 21, 2024Updated 2 years ago
- Forked from tf-rmm@trustedfirmware, support QEMU platform. Check wiki for instruction. https://github.com/Huawei/Huawei_CCA_RMM/wiki☆21Apr 15, 2023Updated 2 years ago
- A code confidentiality framework for Intel SGX☆19Jan 8, 2019Updated 7 years ago