microsoft / KomodoLinks
Formally-verified reference monitor for a secure isolated execution ("enclave") environment on ARM TrustZone
☆110Updated 3 years ago
Alternatives and similar repositories for Komodo
Users that are interested in Komodo are comparing it to the libraries listed below
Sorting:
- Minimal RISC Extensions for Isolated Execution☆54Updated 6 years ago
- ☆71Updated 3 years ago
- Scone Website☆11Updated 2 months ago
- ☆78Updated 3 years ago
- Compiler-based tool that protects Intel SGX applications against controlled-channel attacks☆27Updated 8 years ago
- Low-TCB Linux Applications with SGX Enclaves☆37Updated 6 years ago
- SGXBounds: Memory Safety for Shielded Execution (compiler pass and runtime)☆34Updated 8 years ago
- Spectre attack against SGX enclave☆238Updated 8 years ago
- ☆93Updated 2 weeks ago
- Tutorial: Uncovering and mitigating side-channel leakage in Intel SGX enclaves☆54Updated 10 months ago
- SGX-Shield: Enabling Address Space Layout Randomization (ASLR) for SGX Programs☆49Updated 7 years ago
- Tor anonymity network for SGX☆47Updated 6 years ago
- The implementation of the 'vSGX: Virtualizing SGX Enclaves on AMD SEV' paper☆57Updated 2 years ago
- OpenSGX☆305Updated 5 years ago
- Pedagogical Hypervisor, based on MIT JOS☆67Updated 7 years ago
- ☆22Updated 3 years ago
- Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution☆35Updated 7 years ago
- A code confidentiality framework for Intel SGX☆19Updated 7 years ago
- ☆46Updated 3 years ago
- This is the main repo for Penglai.☆72Updated 2 years ago
- rmem public repo☆49Updated 8 months ago
- Linux kernel source tree☆31Updated this week
- ☆211Updated 3 years ago
- Compartmentalised monolithic library OS☆20Updated 4 years ago
- Simple password-wallet application based on Intel SGX for linux.☆17Updated 5 years ago
- The MIT Sanctum processor top-level project☆31Updated 5 years ago
- SGX Tutorial at CCS17: SGX Security and Privacy☆86Updated 8 years ago
- Calculate AMD SEV/SEV-ES/SEV-SNP measurement for confidential computing☆71Updated 3 months ago
- Automatic detection of speculative information flows☆75Updated 4 years ago
- ☆23Updated 2 years ago