☆40Jan 5, 2026Updated last month
Alternatives and similar repositories for Cornelius
Users that are interested in Cornelius are comparing it to the libraries listed below
Sorting:
- The Intel® Software Guard Extensions Enclave Memory Manager is a module designed to manage dynamic memory within an SGX runtime.☆29Jan 13, 2026Updated last month
- Trust Domain Extensions (TDX) is introducing new, architectural elements to help deploy hardware-isolated, virtual machines (VMs) called …☆94Aug 13, 2025Updated 6 months ago
- ☆94Updated this week
- Implementation of the Reusable Enclaves paper☆14Sep 25, 2023Updated 2 years ago
- ☆43Oct 20, 2025Updated 4 months ago
- ☆35Oct 29, 2025Updated 4 months ago
- Proof of Being Fogotten (PoBF) and PoBF-Compliant Framework (PoCF) prototypes.☆22Aug 7, 2023Updated 2 years ago
- The implementation of the 'vSGX: Virtualizing SGX Enclaves on AMD SEV' paper☆56Nov 7, 2023Updated 2 years ago
- ☆30Feb 9, 2026Updated 3 weeks ago
- A library OS for Linux multi-process applications, with Intel TDX support (experimental)☆46Feb 22, 2026Updated last week
- Intel confidential computing - TDX☆244Feb 13, 2026Updated 2 weeks ago
- P4Control: Line-Rate Cross-Host Attack Prevention via In-Network Information Flow Control Enabled by Programmable Switches and eBPF☆11May 20, 2024Updated last year
- ☆14Mar 10, 2025Updated 11 months ago
- Linux kernel source tree patched with Hypervisor-Enforced Kernel Integrity☆13Nov 14, 2023Updated 2 years ago
- ☆14Nov 11, 2025Updated 3 months ago
- ☆11Jun 10, 2024Updated last year
- Framework for in-VM test execution and monitoring, inspired by Sandsifter☆14Updated this week
- PeTAL: Ensuring Access Control Integrity against Data-only Attacks on Linux (ACM CCS 2024)☆16Nov 4, 2024Updated last year
- Software Artifacts for the paper "TDXdown: Single-Stepping and Instruction Counting Attacks against Intel TDX"☆19Oct 14, 2024Updated last year
- The nbench benchmark ported to SGX.☆14Aug 4, 2019Updated 6 years ago
- Build Trusted Chain for Cloud Native in Confidential Computing Envrionment☆19Feb 25, 2025Updated last year
- Proof-of-concept implementation for the paper "CacheWarp: Software-based Fault Injection using Selective State Reset" (USENIX Security 20…☆65Aug 12, 2024Updated last year
- A version of Griffin used to provide program traces☆15Sep 2, 2020Updated 5 years ago
- ☆16Oct 10, 2025Updated 4 months ago
- A rust implementation for DMTF SPDM protocol to support Confidential Computing☆50Updated this week
- ☆46Updated this week
- ☆17Jun 1, 2023Updated 2 years ago
- Securing System Logs With Intel SGX☆17Mar 31, 2017Updated 8 years ago
- ☆16Feb 12, 2026Updated 2 weeks ago
- Vector OLE and zero-knowledge for Z2k. https://ia.cr/2022/819☆17Mar 10, 2023Updated 2 years ago
- Confidential Containers Shim Firmware☆120Updated this week
- Practical and Efficient in-TEE Verification of Privacy Compliance☆46Jan 10, 2025Updated last year
- This artifact accompanies the paper 'Pronghorn: Effective Checkpoint Orchestration for Serverless Hot-Starts,' which has been accepted fo…☆21Nov 8, 2023Updated 2 years ago
- ☆31Jun 14, 2023Updated 2 years ago
- This repo tracks a compatible state of all sev step components and contains script to easily install everything required to setup a sev v…☆43Feb 15, 2024Updated 2 years ago
- ELISA: Exit-Less, Isolated, and Shared Access for Virtual Machines☆21Nov 1, 2025Updated 4 months ago
- Documentation related to Intel's Confidential Computing offerings☆20Feb 20, 2026Updated last week
- ☆22Dec 19, 2024Updated last year
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆90Sep 18, 2025Updated 5 months ago