☆22Aug 23, 2022Updated 3 years ago
Alternatives and similar repositories for cronus
Users that are interested in cronus are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆22Jul 16, 2022Updated 3 years ago
- ☆28Mar 4, 2025Updated last year
- ☆16Jan 5, 2024Updated 2 years ago
- ☆30Oct 27, 2023Updated 2 years ago
- Shielded Enclaves for Cloud FPGAs☆15Nov 24, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆14Aug 17, 2024Updated last year
- ☆42Feb 26, 2023Updated 3 years ago
- WaTZ: A Trusted WebAssembly Runtime Environment with Remote Attestation for TrustZone.☆33May 23, 2024Updated last year
- The artifact for NDSS '25 paper "ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environmen…☆15Oct 16, 2025Updated 6 months ago
- ☆12Jun 11, 2021Updated 4 years ago
- Protecting Accelerator Execution with Arm Confidential Computing Architecture (USENIX Security 2024)☆27Dec 11, 2023Updated 2 years ago
- Trusted execution experiments with Intel SGX☆11Jun 17, 2020Updated 5 years ago
- ☆29Dec 16, 2022Updated 3 years ago
- Artifacts for ATC '22 paper "Faster Software Packet Processing on FPGA NICs with eBPF Program Warping"☆17May 20, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Goten: GPU-Outsourcing Trusted Execution of Neural Network Training and Prediction☆34Jan 1, 2021Updated 5 years ago
- Medusa Repository: Transynther tool and Medusa Attack☆24Jul 17, 2020Updated 5 years ago
- ☆20Mar 3, 2026Updated 2 months ago
- Reference implementation of Arm-CCA RMM specification☆77Updated this week
- 知乎文章附带代码☆15Jan 26, 2023Updated 3 years ago
- Privacy-preserving Federated Learning with Trusted Execution Environments☆75Jul 10, 2025Updated 9 months ago
- ☆34Nov 7, 2022Updated 3 years ago
- Exploring Methods of Protecting Confidential Erlang Workloads with Intel SGX☆12Jun 19, 2020Updated 5 years ago
- SwornDisk是一个面向可信执行环境的、基于日志结构的安全块设备(全国大学生操作系统比赛2022)☆24Aug 14, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Medusa Repository: Transynther tool and Medusa Attack☆19Jul 14, 2020Updated 5 years ago
- TAOISM: A TEE-based Confidential Heterogeneous Deployment Framework for DNN Models☆52Apr 11, 2024Updated 2 years ago
- GPUReplay, ASPLOS 2022☆41Feb 21, 2022Updated 4 years ago
- Primo: Practical Learning-Augmented Systems with Interpretable Models☆19Dec 26, 2023Updated 2 years ago
- Code for paper: "RemovalNet: DNN model fingerprinting removal attack", IEEE TDSC 2023.☆10Nov 27, 2023Updated 2 years ago
- Matrix multiplication on the NPU inside RK3588☆17Jun 27, 2024Updated last year
- ☆15Aug 16, 2021Updated 4 years ago
- ☆38Aug 6, 2022Updated 3 years ago
- Tests for verifying compliance of RMM implementations☆23Apr 28, 2026Updated last week
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- runs several layers of a deep learning model in TrustZone☆94Aug 8, 2024Updated last year
- ☆49Updated this week
- rkt-io Library OS for running Linux applications inside of Intel SGX enclaves☆35Feb 11, 2022Updated 4 years ago
- Occlum's fork of Intel SGX SDK for Linux☆13Jul 31, 2024Updated last year
- TEE hardware - based on the chipyard repository - hardware to accelerate TEE☆24Dec 16, 2022Updated 3 years ago
- Simple starter CMake project that uses NVBench.☆16May 6, 2025Updated 11 months ago
- Intel® Software Guard Extensions (Intel® SGX) Samples☆11Dec 2, 2016Updated 9 years ago