keystone-enclave / keystone-demo
Demo host and enclave applications exercising most functionality.
☆30Updated last year
Related projects ⓘ
Alternatives and complementary repositories for keystone-demo
- SDK for Keystone Enclave - ABI/SBI libraries and sample apps☆44Updated 2 years ago
- Eyrie enclave runtime kernel☆36Updated last year
- Security monitor for Keystone Enclave (mirror of riscv-pk). Will be deprecated when openSBI port is ready☆36Updated 3 years ago
- Minimal RISC Extensions for Isolated Execution☆50Updated 5 years ago
- A rust implementation for DMTF SPDM protocol to support Confidential Computing☆21Updated this week
- MultiZone® Security TEE is the quick and safe way to add security and separation to any RISC-V processors. The RISC-V standard ISA doesn'…☆82Updated 10 months ago
- ☆71Updated last year
- Compiler-based tool that protects Intel SGX applications against controlled-channel attacks☆27Updated 7 years ago
- Calculate AMD SEV/SEV-ES/SEV-SNP measurement for confidential computing☆55Updated 5 months ago
- The main repo of Penglai Enclave based on RISC-V Trapped Virtual Memory (TVM).☆37Updated last year
- Formally-verified reference monitor for a secure isolated execution ("enclave") environment on ARM TrustZone☆103Updated 2 years ago
- Design documents and interoperability tests for Interoperable RA-TLS projects☆11Updated 10 months ago
- This repo is used for managing conversations about Veraison features☆52Updated 10 months ago
- This repo holds the work area and revisions of the non-ISA specification created by the RISC-V AP-TEE TG. This specification defines the …☆51Updated this week
- ☆21Updated this week
- Meeting materials☆15Updated 2 weeks ago
- The MIT Sanctum processor top-level project☆28Updated 4 years ago
- Keystone security monitor library for opensbi (Discountinued after monorepo-izing)☆13Updated 2 years ago
- Risc-V hypervisor for TEE development☆99Updated last year
- AMD SEV Tool☆81Updated last year
- Artifacts for our ShowTime paper (AsiaCCS '23), including distinguishing cache hits and misses with the human eye.☆11Updated last year
- Using Data Memory-Dependent Prefetchers to Leak Data at Rest☆32Updated 2 years ago
- ☆78Updated last year
- ☆11Updated this week
- A tool to enable fuzzing for Spectre vulnerabilities☆30Updated 4 years ago
- Linux kernel source tree☆26Updated this week
- A library OS for Linux multi-process applications, with Intel TDX support (experimental)☆19Updated last month
- Tool to Analyze Speculative Execution Attacks and Mitigations☆53Updated 2 years ago
- Using Malicious #VC Interrupts to Break AMD SEV-SNP (IEEE S&P 2024)☆22Updated 7 months ago