lsds / intravisorLinks
Virtualisation platform using CHERI for isolation and sharing
☆40Updated last year
Alternatives and similar repositories for intravisor
Users that are interested in intravisor are comparing it to the libraries listed below
Sorting:
- The main repo of Penglai Enclave based on RISC-V Trapped Virtual Memory (TVM).☆39Updated 2 years ago
- rkt-io Library OS for running Linux applications inside of Intel SGX enclaves☆33Updated 3 years ago
- Microscope: Enabling Microarchitectural Replay Attacks☆19Updated 4 years ago
- Skyloft: A General High-Efficient Scheduling Framework in User Space (SOSP 2024)☆36Updated 9 months ago
- ☆49Updated 3 years ago
- ☆23Updated 2 years ago
- ☆18Updated 2 years ago
- The repo contains the SPMP architectural specification, which includes capabilities like access control of read/write/execute requests by…☆16Updated last month
- Hodor-PKU☆25Updated 3 years ago
- Use hardware performance counters to find mapping of addresses to L3 slices in Intel processors☆16Updated last year
- ☆72Updated last year
- HW interface for memory caches☆28Updated 5 years ago
- Medusa Repository: Transynther tool and Medusa Attack☆21Updated 4 years ago
- The Intel® Software Guard Extensions Enclave Memory Manager is a module designed to manage dynamic memory within an SGX runtime.☆27Updated 3 months ago
- Transparent zero-copy IO☆20Updated last year
- Linux kernel source tree☆28Updated last week
- Protecting Accelerator Execution with Arm Confidential Computing Architecture (USENIX Security 2024)☆26Updated last year
- A script to create bootable OS images, and run qemu with a locally built kernel.☆66Updated last week
- ☆20Updated 3 years ago
- Trusted I/O Paths for SGX Enclaves☆16Updated 5 years ago
- ☆62Updated 11 months ago
- VANS: A validated NVRAM simulator☆27Updated last year
- ☆57Updated last year
- ☆16Updated last year
- ReDMArk: Bypassing RDMA Security Mechanisms.☆41Updated 4 years ago
- PARSEC 3.0 benchmark suite☆11Updated 7 years ago
- MIRAGE (USENIX Security 2021)☆13Updated last year
- ☆16Updated last year
- ☆36Updated 11 months ago
- Gem5 implementation of "InvisiSpec", a defense mechanism of speculative execution attacks on cache hierarchy.☆60Updated 5 years ago