kunisuzaki / miscLinks
misc
☆13Updated 10 years ago
Alternatives and similar repositories for misc
Users that are interested in misc are comparing it to the libraries listed below
Sorting:
- ☆34Updated last month
- Using Malicious #VC Interrupts to Break AMD SEV-SNP (IEEE S&P 2024)☆24Updated last year
- Getting Started with the Core Slicing Prototype☆14Updated 2 years ago
- WaTZ: A Trusted WebAssembly Runtime Environment with Remote Attestation for TrustZone.☆31Updated last year
- A library OS for Linux multi-process applications, with Intel TDX support (experimental)☆39Updated 3 weeks ago
- The implementation of the 'vSGX: Virtualizing SGX Enclaves on AMD SEV' paper☆55Updated last year
- Protecting Accelerator Execution with Arm Confidential Computing Architecture (USENIX Security 2024)☆26Updated last year
- Bioinformatic Interpreter with Intel SGX☆22Updated 5 years ago
- A formally verified security module for AMD confidential VMs☆49Updated 2 months ago
- An on-device confidential computing platform☆119Updated this week
- Proof-of-concept implementation for the paper "CacheWarp: Software-based Fault Injection using Selective State Reset" (USENIX Security 20…☆63Updated 11 months ago
- ☆40Updated last week
- Implementation of the Reusable Enclaves paper☆14Updated last year
- Code repository for the research paper "A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP"☆13Updated 3 years ago
- A thin-hypervisor that runs on aarch64 CPUs.☆95Updated last month
- Calculate AMD SEV/SEV-ES/SEV-SNP measurement for confidential computing☆66Updated this week
- ☆22Updated last year
- ☆13Updated 5 months ago
- ☆23Updated 3 years ago
- Breaking Confidential VMs with Malicious Interrupts (USENIX Security 2024)☆32Updated last year
- This repo tracks a compatible state of all sev step components and contains script to easily install everything required to setup a sev v…☆42Updated last year
- ELISA: Exit-Less, Isolated, and Shared Access for Virtual Machines☆19Updated 2 years ago
- Proof-of-concept code for the IEEE S&P 2025 paper "Peek-a-Walk: Leaking Secrets via Page Walk Side Channels"☆24Updated last month
- ☆21Updated 2 years ago
- Tutorial: Uncovering and mitigating side-channel leakage in Intel SGX enclaves☆51Updated 4 months ago
- This repository contains the source code related to the research paper titled "Temporal System Call Specialization for Attack Surface Red…☆37Updated 8 months ago
- Trust Domain Extensions (TDX) is introducing new, architectural elements to help deploy hardware-isolated, virtual machines (VMs) called …☆71Updated last month
- Compiler-based tool that protects Intel SGX applications against controlled-channel attacks☆27Updated 8 years ago
- ☆39Updated this week
- ☆49Updated 3 years ago