☆41Jan 5, 2026Updated 2 months ago
Alternatives and similar repositories for Cornelius
Users that are interested in Cornelius are comparing it to the libraries listed below
Sorting:
- The Intel® Software Guard Extensions Enclave Memory Manager is a module designed to manage dynamic memory within an SGX runtime.☆29Jan 13, 2026Updated 2 months ago
- Trust Domain Extensions (TDX) is introducing new, architectural elements to help deploy hardware-isolated, virtual machines (VMs) called …☆100Aug 13, 2025Updated 7 months ago
- ☆93Updated this week
- Linux kernel source tree patched with Hypervisor-Enforced Kernel Integrity☆13Nov 14, 2023Updated 2 years ago
- ☆35Oct 29, 2025Updated 4 months ago
- The implementation of the 'vSGX: Virtualizing SGX Enclaves on AMD SEV' paper☆55Nov 7, 2023Updated 2 years ago
- Implementation of the Reusable Enclaves paper☆14Sep 25, 2023Updated 2 years ago
- Proof of Being Fogotten (PoBF) and PoBF-Compliant Framework (PoCF) prototypes.☆22Aug 7, 2023Updated 2 years ago
- ☆14Mar 10, 2025Updated last year
- ☆30Feb 27, 2026Updated 3 weeks ago
- PeTAL: Ensuring Access Control Integrity against Data-only Attacks on Linux (ACM CCS 2024)☆16Nov 4, 2024Updated last year
- Intel confidential computing - TDX☆247Feb 13, 2026Updated last month
- A library OS for Linux multi-process applications, with Intel TDX support (experimental)☆47Updated this week
- ☆102May 27, 2024Updated last year
- ☆13Feb 3, 2026Updated last month
- Framework for in-VM test execution and monitoring, inspired by Sandsifter☆15Updated this week
- Next-Gen Occlum, a work-in-progress fork of Occlum that is optimized for the next-generation of Intel SGX (on Xeon SP processors)☆35Mar 28, 2023Updated 2 years ago
- P4Control: Line-Rate Cross-Host Attack Prevention via In-Network Information Flow Control Enabled by Programmable Switches and eBPF☆11May 20, 2024Updated last year
- The nbench benchmark ported to SGX.☆14Aug 4, 2019Updated 6 years ago
- ☆11Jun 10, 2024Updated last year
- Securing System Logs With Intel SGX☆17Mar 31, 2017Updated 8 years ago
- Software Artifacts for the paper "TDXdown: Single-Stepping and Instruction Counting Attacks against Intel TDX"☆19Oct 14, 2024Updated last year
- ☆14Nov 11, 2025Updated 4 months ago
- ☆58Mar 12, 2026Updated last week
- Build Trusted Chain for Cloud Native in Confidential Computing Envrionment☆19Feb 25, 2025Updated last year
- ☆18Mar 5, 2026Updated 2 weeks ago
- ☆58Mar 26, 2025Updated 11 months ago
- A version of Griffin used to provide program traces☆15Sep 2, 2020Updated 5 years ago
- Proof-of-concept implementation for the paper "CacheWarp: Software-based Fault Injection using Selective State Reset" (USENIX Security 20…☆63Aug 12, 2024Updated last year
- A rust implementation for DMTF SPDM protocol to support Confidential Computing☆52Updated this week
- Confidential Containers Shim Firmware☆120Mar 16, 2026Updated last week
- Cumulative cyclomatic complexity calculation for Ghidra☆20Feb 26, 2026Updated 3 weeks ago
- An Open and Cross-platform Trusted Execution Environment.☆150Sep 27, 2024Updated last year
- ☆47Mar 16, 2026Updated last week
- https://packages.debian.org/source/sid/netkit-telnet☆15Jan 28, 2017Updated 9 years ago
- ☆16Oct 10, 2025Updated 5 months ago
- Documentation related to Intel's Confidential Computing offerings☆21Mar 13, 2026Updated last week
- This artifact accompanies the paper 'Pronghorn: Effective Checkpoint Orchestration for Serverless Hot-Starts,' which has been accepted fo…☆21Nov 8, 2023Updated 2 years ago
- ☆22Dec 19, 2024Updated last year