google / asylo-examples
☆22Updated 3 years ago
Alternatives and similar repositories for asylo-examples:
Users that are interested in asylo-examples are comparing it to the libraries listed below
- Stores Chromium Channel ID private keys in an Intel SGX enclave.☆33Updated 8 years ago
- Running BoringSSL tests against OpenSSL☆14Updated 3 years ago
- Experiments in converting bzip2 API to be RPC-based☆14Updated 8 years ago
- OSS-Fuzz - continuous fuzzing of open source software☆11Updated 8 years ago
- Library for the Intel SGX SDK with basic helper functions☆18Updated 7 years ago
- This sample code demonstrates a password manager utilizing Intel SGX.☆34Updated 8 years ago
- ☆34Updated 4 years ago
- ☆16Updated 9 years ago
- Multiplication using AVX512 and AVX512IFMA instructions☆23Updated 9 years ago
- A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes☆45Updated last year
- Dynamic instrumentation of the Linux kernel☆41Updated 10 years ago
- Scripts that I used to write a blog post about section 7.24.1(2) of C11☆11Updated 8 years ago
- SDK for Keystone Enclave - ABI/SBI libraries and sample apps☆44Updated 2 years ago
- Common dependency management for various Trail of Bits C++ codebases☆34Updated 10 months ago
- This repo contains a version of the LLVM test suite that is being modified to use Checked C. The modified programs will be used to ben…☆13Updated 2 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆15Updated 8 years ago
- An implementation of the OPAQUE password-authenticated key exchange protocol☆10Updated this week
- Chromium extension to inspect W3C Web Cryptography API calls and keys.☆13Updated 10 years ago
- ☆16Updated 7 years ago
- Python code for 1) permuting randomly-generated passwords for easier entry on mobile devices, and 2) for estimating entropy lost as a res…☆16Updated 9 years ago
- Detect patterns of bad behavior in function calls☆26Updated 4 years ago
- An experimental patchset management tool.☆12Updated 4 years ago
- ☆34Updated 2 years ago
- Basic x86 Symbolic Execution for educational purposes☆18Updated 7 years ago
- Code for experiments referenced in the Usenix Security 2017 paper "Strong and Efficient Cache Side-Channel Protection using Hardware Tran…☆14Updated 2 years ago
- Tor anonymity network for SGX☆46Updated 6 years ago
- Implementation of Shamir's secret sharing in C++11☆9Updated 10 years ago
- Eyrie enclave runtime kernel☆36Updated last year
- CrunchyCrypt - Safe and Simple Cryptography☆127Updated 5 years ago