anishathalye / notary
Notary: A Device for Secure Transaction Approval 📟
☆28Updated last year
Related projects ⓘ
Alternatives and complementary repositories for notary
- Tools for reasoning about circuits in Rosette/Racket 🔌☆19Updated 3 months ago
- Security monitor for Keystone Enclave (mirror of riscv-pk). Will be deprecated when openSBI port is ready☆36Updated 3 years ago
- Iodine: Verifying Constant-Time Execution of Hardware☆11Updated 3 years ago
- A framework for formally verifying hardware security modules to be free of hardware, software, and timing side-channel vulnerabilities 🔏☆33Updated last year
- Minimal RISC Extensions for Isolated Execution☆50Updated 5 years ago
- CHERI-RISC-V model written in Sail☆55Updated last week
- ☆30Updated 2 years ago
- CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives☆58Updated 4 months ago
- ☆10Updated last year
- Verification of BPF JIT compilers☆54Updated last year
- [HISTORICAL] FIPS and higher-level algorithm tests for RISC-V Crypto Extension☆26Updated 3 months ago
- Verifying OpenTitan☆22Updated last year
- This repo contains the artifact for our SOSP'19 paper on Serval☆28Updated 5 years ago
- CHERI C/C++ Programming Guide☆30Updated last year
- ☆16Updated 2 years ago
- Circuits and hardware security modules formally verified with Knox 🔐☆24Updated 8 months ago
- Hardware implementation of ORAM☆22Updated 7 years ago
- MAGE: Memory-Aware Garbling Engine☆26Updated 3 months ago
- A low-level intermediate representation for hardware description languages☆25Updated 4 years ago
- Tests for verifying compliance of RMM implementations☆16Updated 3 weeks ago
- A Tool for the Static Analysis of Cache Side Channels☆39Updated 7 years ago
- RISC-V BSV Specification☆17Updated 4 years ago
- ☆18Updated 9 years ago
- ☆9Updated 2 years ago
- Data oblivious ISA prototyped on the RISC-V BOOM processor.☆20Updated 2 years ago
- A repository of tools for verifying constant-timeness☆12Updated 2 months ago
- Compiler-based tool that protects Intel SGX applications against controlled-channel attacks☆27Updated 7 years ago
- Main repository of the Vigor NF verification project.☆45Updated 3 years ago
- Formally-verified reference monitor for a secure isolated execution ("enclave") environment on ARM TrustZone☆103Updated 2 years ago
- ☆29Updated 4 years ago