google / asylo-examplesLinks
☆23Updated 4 years ago
Alternatives and similar repositories for asylo-examples
Users that are interested in asylo-examples are comparing it to the libraries listed below
Sorting:
- A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes☆46Updated 2 years ago
- Stores Chromium Channel ID private keys in an Intel SGX enclave.☆33Updated 9 years ago
- Tor anonymity network for SGX☆47Updated 6 years ago
- Securing storage encryption by using Intel SGX enclaves. First attempt for the isolation of OS components with trusted enclaves.☆80Updated 8 years ago
- A "Hello World" Intel SGX enclave program☆91Updated 4 years ago
- ☆77Updated 7 years ago
- The Intel(R) Enhanced Privacy ID Software Development Kit☆30Updated 2 years ago
- Spectre attack against SGX enclave☆238Updated 7 years ago
- SDK for Keystone Enclave - ABI/SBI libraries and sample apps☆44Updated 3 years ago
- Eyrie enclave runtime kernel☆37Updated 2 years ago
- PoC of an SGX enclave performing symmetric reencryption☆50Updated 9 years ago
- SGX command-line tools and paper☆147Updated 9 years ago
- Shadow-Box: Lightweight and Practical Kernel Protector for ARM (Presented at BlackHat Asia 2018)☆73Updated 7 years ago
- Building Distributed Enclave Applications with Sancus and SGX☆13Updated 4 years ago
- Code for the paper EvilCoder: Automated Bug Insertion at ACSAC 2016☆46Updated 8 years ago
- Detect patterns of bad behavior in function calls☆25Updated 5 years ago
- ☆35Updated 2 years ago
- ☆71Updated 2 years ago
- IPE is a Linux Security Module (LSM), which allows for a configurable policy to enforce integrity requirements on the whole system. IPE b…☆65Updated 6 months ago
- Using SGX to harden password hashing☆34Updated 9 years ago
- Linux kernel JIT spray for SMEP / KERNEXEC bypass☆55Updated 12 years ago
- SGX Tutorial at CCS17: SGX Security and Privacy☆86Updated 7 years ago
- Dynamic instrumentation of the Linux kernel☆40Updated 10 years ago
- A POSIX Filesystem for Enclaves with a Mechanized Safety Proof☆17Updated 6 years ago
- ☆19Updated 5 years ago
- Robust Internet of Things, Microsoft Research☆88Updated 2 years ago
- Efficient TLS termination inside Intel SGX enclaves for existing applications☆109Updated 3 years ago
- Sample programs that illustrate how to use control flow integrity with the clang compiler☆106Updated 6 years ago
- This sample code demonstrates a password manager utilizing Intel SGX.☆34Updated 9 years ago
- Securing System Logs With Intel SGX☆16Updated 8 years ago