comet-cc / GuaranTEE
☆12Updated 8 months ago
Alternatives and similar repositories for GuaranTEE
Users that are interested in GuaranTEE are comparing it to the libraries listed below
Sorting:
- ☆10Updated last year
- A POSIX Filesystem for Enclaves with a Mechanized Safety Proof☆17Updated 5 years ago
- Using Malicious #VC Interrupts to Break AMD SEV-SNP (IEEE S&P 2024)☆24Updated last year
- Memory Tagging ISA extension that can be used by software to enforce memory tag checks on memory loads and stores☆14Updated last week
- Tests for verifying compliance of RMM implementations☆18Updated 2 months ago
- Trusted Gateway: hardened router architecture with ARM TrustZone protected firewall, routing, and NIC modules.☆14Updated 2 years ago
- TEE hardware - based on the chipyard repository - hardware to accelerate TEE☆23Updated 2 years ago
- Website for Research Artifacts from the Security Community☆18Updated 2 weeks ago
- A brand new OS that runs in various kinds of TEEs and supports Linux ABI☆15Updated 3 years ago
- ☆12Updated 3 years ago
- Artifacts for our ShowTime paper (AsiaCCS '23), including distinguishing cache hits and misses with the human eye.☆12Updated last year
- Artifacts for the paper "KSplit: Automating Device Driver Isolation"☆11Updated 2 years ago
- ☆16Updated 2 years ago
- This tool set can generate required capabilities for binaries. A system call to capability mapping is used to assign capability to the bi…☆14Updated 2 years ago
- Tools created for the DARPA Cyber Grand Challenge that visualize software execution based on traces generated by the CGC Monitor and a Un…☆14Updated 6 years ago
- CHERI ISA Specification☆24Updated 10 months ago
- Breaking Confidential VMs with Malicious Interrupts (USENIX Security 2024)☆30Updated last year
- Towards Sound Reassembly of Modern x86-64 Binaries (ASPLOS'25)☆13Updated last month
- Intel’s HERACLES accelerator introduces a new set of fundamental instructions, the Polynomial Instructions Set Architecture (P-ISA) that …☆34Updated this week
- A migration for the page table entry based side-channel attack agains SGX enclaves.☆16Updated 3 months ago
- ☆23Updated 2 months ago
- QARMA block cipher in C☆30Updated 2 years ago
- 🌄 RISC-V Ecosystem Landscape: a living document that developers, investors, vendors, researchers and others can use as a resource on the…☆14Updated this week
- LLVM with SGX support☆13Updated 7 years ago
- The public release of LeftoverLocals code☆66Updated last year
- LLVM-Canon aims to transform LLVM modules into a canonical form by reordering and renaming instructions while preserving the same semanti…☆15Updated last year
- GoTEE - example application☆16Updated last month
- PoC exploits against various SGX enclaves☆14Updated 2 years ago
- RISC-V Tools (GNU Toolchain, ISA Simulator, Tests)☆21Updated 6 years ago
- Data oblivious ISA prototyped on the RISC-V BOOM processor.☆21Updated 2 years ago