pKVM POC for x86
☆31Feb 28, 2026Updated this week
Alternatives and similar repositories for pKVM-IA
Users that are interested in pKVM-IA are comparing it to the libraries listed below
Sorting:
- ☆15Jan 5, 2024Updated 2 years ago
- The artifact for NDSS '25 paper "ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environmen…☆14Oct 16, 2025Updated 4 months ago
- ☆14Nov 11, 2025Updated 3 months ago
- 🛠 [WIP] An emulator for Nintendo Entertainment System written in Rust☆13Sep 24, 2020Updated 5 years ago
- Modular Provable Security on Commodity System and Application Software Stacks☆13Jan 6, 2022Updated 4 years ago
- Proof of Being Fogotten (PoBF) and PoBF-Compliant Framework (PoCF) prototypes.☆22Aug 7, 2023Updated 2 years ago
- ELISA: Exit-Less, Isolated, and Shared Access for Virtual Machines☆21Nov 1, 2025Updated 4 months ago
- Artefacts for: "VMScape: Exposing and Exploiting Incomplete Branch Predictor Isolation in Cloud Environments"☆36Oct 17, 2025Updated 4 months ago
- Using Malicious #VC Interrupts to Break AMD SEV-SNP (IEEE S&P 2024)☆26Apr 22, 2024Updated last year
- Super IRC Bot Hitozuma (人妻)☆12Mar 17, 2011Updated 14 years ago
- Linux/Unix nbench (previously known as BYTE's Native Mode Benchmarks)☆30Aug 15, 2014Updated 11 years ago
- Breaking Confidential VMs with Malicious Interrupts (USENIX Security 2024)☆33May 3, 2024Updated last year
- ☆22Jul 16, 2022Updated 3 years ago
- ☆78Jan 7, 2023Updated 3 years ago
- An Open and Cross-platform Trusted Execution Environment.☆150Sep 27, 2024Updated last year
- Linux kernel source tree☆10Oct 11, 2017Updated 8 years ago
- ☆11May 10, 2016Updated 9 years ago
- Virtual I/O acceleration technologies for KVM☆15Sep 17, 2013Updated 12 years ago
- Pseudo-Intel-CET functionality plugin based on QEMU 8.2.2 plugin system, with minor modifications to QEMU TCG body code to adapt to Glibc…☆14Jun 5, 2024Updated last year
- 有名な学習済みの機械学習モデルをcliから簡単に利用するためのコマンドです。Quick Using TensorFlow.js Models on CLI.☆10Aug 3, 2022Updated 3 years ago
- ☆13Jul 9, 2014Updated 11 years ago
- wannabe (up-to-date) 64bit port of lguest☆14May 11, 2011Updated 14 years ago
- ☆17Sep 10, 2020Updated 5 years ago
- ☆11Jun 10, 2024Updated last year
- A PDF that shows its own MD5☆11Jan 2, 2023Updated 3 years ago
- Veracruz branches of https://gitlab.com/arm-research/security/icecap/icecap☆19Jan 22, 2024Updated 2 years ago
- ☆20Updated this week
- ACI-GetStarted☆11Jun 4, 2025Updated 8 months ago
- Microbenchmarks for x86_64 kernel entry methods☆20Feb 21, 2022Updated 4 years ago
- The ICS^2 Matrix is a threat taxonomy for Programmable Logic Controllers and Industrial Control Systems☆13Sep 10, 2024Updated last year
- A simple Mali 6xx/7xx register interface model that doesn't do any rendering.☆13Jan 29, 2016Updated 10 years ago
- For our ISSTA'23 paper ACETest: Automated Constraint Extraction for Testing Deep Learning Operators☆13Mar 30, 2024Updated last year
- Hypervisor from scratch in linux☆13May 8, 2022Updated 3 years ago
- Fuzzing Secure Monitor Implementations☆19Aug 3, 2024Updated last year
- 最新漏洞收集、复现、漏洞环境☆10Mar 21, 2019Updated 6 years ago
- Shadow Attack, LiRA, Quantile Regression and RMIA implementations in PyTorch (Online version)☆14Nov 8, 2024Updated last year
- ☆12Apr 1, 2025Updated 11 months ago
- Dev resources of Harmony☆15Mar 4, 2024Updated last year
- Centos6/7一键清理内核☆10Mar 10, 2020Updated 5 years ago