amd / AMD-ASPFWLinks
☆98Updated last year
Alternatives and similar repositories for AMD-ASPFW
Users that are interested in AMD-ASPFW are comparing it to the libraries listed below
Sorting:
- Linux SVSM (Secure VM Service Module) for secure x86 virtualization in Rust☆131Updated last year
- COCONUT-SVSM☆161Updated this week
- ☆40Updated this week
- A rust implementation for DMTF SPDM protocol to support Confidential Computing☆35Updated last week
- ☆35Updated last week
- Using Malicious #VC Interrupts to Break AMD SEV-SNP (IEEE S&P 2024)☆24Updated last year
- AMD SEV Tool☆85Updated 2 years ago
- Calculate AMD SEV/SEV-ES/SEV-SNP measurement for confidential computing☆65Updated last year
- An on-device confidential computing platform☆116Updated this week
- Confidential Containers Shim Firmware☆111Updated this week
- Proof-of-concept implementation for the paper "CacheWarp: Software-based Fault Injection using Selective State Reset" (USENIX Security 20…☆63Updated 10 months ago
- ☆24Updated last month
- Administrator : Marshall.Dawson@amd.com☆51Updated 4 months ago
- AMD Secure Encrypted Virtualization☆332Updated 3 months ago
- InSpectre Gadget: in-depth inspection and exploitability analysis of Spectre disclosure gadgets☆54Updated 3 months ago
- ☆39Updated last month
- ☆89Updated 2 weeks ago
- Linux kernel source tree☆28Updated 3 weeks ago
- Linux Security Hardening for Confidential Compute☆67Updated 9 months ago
- This repo tracks a compatible state of all sev step components and contains script to easily install everything required to setup a sev v…☆41Updated last year
- TikTag: Breaking ARM's Memory Tagging Extension with Speculative Execution (IEEE S&P 2025)☆78Updated 7 months ago
- QEMU fork☆23Updated 2 weeks ago
- A utility for decoding aarch64 ESR register values.☆92Updated last week
- Run integrity protected workloads in a hardware based Trusted Execution Environment.☆38Updated last week
- Risc-V hypervisor for TEE development☆119Updated 3 weeks ago
- ☆58Updated 3 months ago
- pKVM POC for x86☆24Updated this week
- Reference implementation of Arm-CCA RMM specification☆55Updated last week
- Breaking Confidential VMs with Malicious Interrupts (USENIX Security 2024)☆31Updated last year
- Meeting materials☆15Updated last week