For paper Container-IMA: https://www.usenix.org/system/files/raid2019-luo.pdf
☆12Mar 12, 2020Updated 6 years ago
Alternatives and similar repositories for Container-IMA
Users that are interested in Container-IMA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Nov 10, 2019Updated 6 years ago
- Compiler-based tool that protects Intel SGX applications against controlled-channel attacks☆26May 23, 2017Updated 8 years ago
- This repository contains the nested kernel implementation as it was built for the ASPLOS 2015 paper, including the FreeBSD prototype Pers…☆56Jul 7, 2017Updated 8 years ago
- ☆11Feb 22, 2016Updated 10 years ago
- Simple Encrypted File System for Occlum☆13Oct 29, 2025Updated 6 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Code repository for the research paper "A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP"☆13May 17, 2022Updated 3 years ago
- TWINE: An Embedded Trusted Runtime for WebAssembly. This is the repository that contains the source code of Twine and the related benchma…☆43Mar 14, 2024Updated 2 years ago
- ☆21Sep 7, 2022Updated 3 years ago
- 对一些开源cms官网的更新,github commit进行监控的工具☆11Dec 27, 2018Updated 7 years ago
- A POSIX Filesystem for Enclaves with a Mechanized Safety Proof☆17Sep 20, 2019Updated 6 years ago
- ☆13Mar 25, 2021Updated 5 years ago
- ☆10Jun 10, 2024Updated last year
- Remote attestation for Trusted and Confidential Computing platforms (TPM, AMD SEV-SNP, Intel SGX/TDX)☆23Apr 26, 2026Updated last week
- uber eXtensible Micro-Hypervisor Framework☆33Jun 19, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- TPM Remote Attestation protocol using go-tpm and gRPC☆30Apr 24, 2026Updated last week
- Automatic AppArmor management for Docker containers☆16Jul 22, 2023Updated 2 years ago
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆22Feb 19, 2020Updated 6 years ago
- ☆42Feb 26, 2023Updated 3 years ago
- Multilayered, Log-structured Secure Disk (MlsDisk) protects the disk I/O for TEEs☆20Jul 4, 2024Updated last year
- Website for Research Artifacts from the Security Community☆31Apr 24, 2026Updated last week
- The Solo5 unikernel☆14Apr 10, 2019Updated 7 years ago
- ☆179Jan 7, 2023Updated 3 years ago
- ☆28Mar 4, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Time_series_forecasting in R using ARIMA,Auto ARIMA ,Arimax and Holt Winters☆21Nov 14, 2017Updated 8 years ago
- ☆27Nov 24, 2021Updated 4 years ago
- SGX-Spark☆26Dec 5, 2022Updated 3 years ago
- GAUSS EU project: Unmanned aerial vehicle Traffic Management (UTM) software development☆15Feb 7, 2022Updated 4 years ago
- The Chrome plugin for SafeKeeper password protection service.☆12Apr 25, 2018Updated 8 years ago
- 工业控制系统中实时篡改TE传感器与PLC可编程逻辑控制之间的Modbus/TCP通信数据☆13Jun 17, 2019Updated 6 years ago
- ☆12Nov 25, 2016Updated 9 years ago
- SGXRay: a bounded verifier for Intel SGX enclaves☆13Sep 10, 2021Updated 4 years ago
- ☆23Jun 23, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Container building stuff☆16Mar 3, 2026Updated 2 months ago
- ☆14Dec 27, 2020Updated 5 years ago
- eAudit suite for recording provenance-related system calls on Linux☆20Jan 16, 2026Updated 3 months ago
- WaTZ: A Trusted WebAssembly Runtime Environment with Remote Attestation for TrustZone.☆33May 23, 2024Updated last year
- ☆12Jun 14, 2021Updated 4 years ago
- Modbus Client and Server written in Python-2.7☆17Dec 16, 2015Updated 10 years ago
- This project was conducted by the 10th KITRI BoB (Best of the Best), and recorded what we have done for vulnerability analysis of drones.☆12Dec 30, 2021Updated 4 years ago