☆19Nov 24, 2020Updated 5 years ago
Alternatives and similar repositories for Intel-SGX-Crypto-Demo
Users that are interested in Intel-SGX-Crypto-Demo are comparing it to the libraries listed below
Sorting:
- SGX Tutorial at CCS17: SGX Security and Privacy☆86Nov 8, 2017Updated 8 years ago
- Ratel - a new framework for instruction-level interposition on enclaved applications☆25Dec 14, 2022Updated 3 years ago
- COIN Attacks: on Insecurity of Enclave Untrusted Interfaces in SGX - ASPLOS 2020☆26Dec 12, 2022Updated 3 years ago
- ExitLess services for SGX enclaves☆34Sep 10, 2019Updated 6 years ago
- Instruction and files for porting Arm DesignStart to CW305.☆16Dec 6, 2023Updated 2 years ago
- GAUSS EU project: Unmanned aerial vehicle Traffic Management (UTM) software development☆14Feb 7, 2022Updated 4 years ago
- This is an example of RSA encrypt/decrypt methods running on OP-TEE.☆11Sep 6, 2018Updated 7 years ago
- Origin-sensitive Control Flow Integrity (OS-CFI) - USENIX Security 2019☆38Jan 10, 2022Updated 4 years ago
- Practical and Efficient in-TEE Verification of Privacy Compliance☆46Jan 10, 2025Updated last year
- SGX-LKL Library OS for running Linux applications inside of Intel SGX enclaves☆270Dec 25, 2022Updated 3 years ago
- Tool used to create ADI Kuiper Linux userspace images☆18Updated this week
- ☆14Nov 10, 2019Updated 6 years ago
- WASP Research Arena for Software☆12Jun 10, 2022Updated 3 years ago
- USB library for ChipWhisperer devices☆15Jan 22, 2026Updated last month
- sgx-based encrypted deduplication prototype☆14May 14, 2021Updated 4 years ago
- A tiny Debugger : - )☆10Jan 24, 2021Updated 5 years ago
- IoT operating system for microcontrollers.☆12Jul 3, 2023Updated 2 years ago
- Cross-Domain DPA Attack on SAML11☆17Jul 14, 2019Updated 6 years ago
- 工业控制系统中实时篡改TE传感器与PLC可编程逻辑控制之间的Modbus/TCP通信数据☆13Jun 17, 2019Updated 6 years ago
- A Secure Version of DATAVIEW using SGX techniques.☆10Jul 6, 2021Updated 4 years ago
- ☆12Apr 19, 2020Updated 5 years ago
- C# .Net Standard 2.0 wrapper for the ApexCharts Javascript Library - https://apexcharts.com☆14Dec 8, 2022Updated 3 years ago
- Manage efficiently your heavy side-channel datasets with eShard library and process them with http://gitlab.com/eshard/scared. This is a …☆14Jan 28, 2026Updated last month
- Resillent Control-Flow Attestation☆13Sep 30, 2021Updated 4 years ago
- ☆10Feb 24, 2023Updated 3 years ago
- ☆19Nov 26, 2025Updated 3 months ago
- ☆14Dec 27, 2020Updated 5 years ago
- RTSA-API-Samples☆13Jun 4, 2025Updated 9 months ago
- ASTORIA is a framework developed to allow the simulation of attacks and the evaluation of their impact on Smart Grid infrastructures.☆10Feb 5, 2018Updated 8 years ago
- Simulating Industrial IoT with IGSS SCADA and Rasberry Pi, Attacking and fixing potential vulnerabilities☆13Jun 7, 2020Updated 5 years ago
- Artifacts and documentation of the TOPS journal paper End-to-End Security for Distributed Event-driven Enclave Applications on Heterogene…☆12Jan 4, 2024Updated 2 years ago
- Somewhat homomorphic encryption over elliptic curve using BGN cryptosystem☆12May 7, 2022Updated 3 years ago
- 可信计算实验☆10Jan 3, 2022Updated 4 years ago
- Implementation of flush + reload attack to extract private key from the GnuPG implementation of RSA.☆11Aug 8, 2019Updated 6 years ago
- Adding trace to DesignStart for easier side-channel analysis on the CW305 target. Also supports PhyWhisperer.☆17Feb 19, 2025Updated last year
- Stanford Cryptography class excercises☆20May 13, 2012Updated 13 years ago
- ☆12Jul 13, 2018Updated 7 years ago
- This project is aimed to create a trustClient(use TrustZone on ARM) and a server program to verify whether a executable program on Raspbe…☆17Mar 15, 2024Updated last year
- Project of Data and System Security course (Master's Degree in Cybersecurity at University of Pisa)☆14Dec 14, 2020Updated 5 years ago