A formally verified security module for AMD confidential VMs
☆64Dec 11, 2025Updated 2 months ago
Alternatives and similar repositories for verismo
Users that are interested in verismo are comparing it to the libraries listed below
Sorting:
- Software Artifacts for the paper "TDXdown: Single-Stepping and Instruction Counting Attacks against Intel TDX"☆19Oct 14, 2024Updated last year
- A community preview of ongoing formal verification efforts for Asterinas☆42Updated this week
- ☆22Updated this week
- The implementation of the 'vSGX: Virtualizing SGX Enclaves on AMD SEV' paper☆56Nov 7, 2023Updated 2 years ago
- Implementation of the Reusable Enclaves paper☆14Sep 25, 2023Updated 2 years ago
- A minimal bootstrap scheme for fast boot of serverless microVMs with AMD Secure Encrypted Virtualization (SEV)☆15Feb 7, 2024Updated 2 years ago
- Proof-of-concept implementation for the paper "CacheWarp: Software-based Fault Injection using Selective State Reset" (USENIX Security 20…☆65Aug 12, 2024Updated last year
- High-assurance and performant Rust-based parsing and serialization of binary data formats verified in Verus☆49Feb 25, 2026Updated last week
- The artifact of the SOSP '25 paper "CortenMM: Efficient Memory Management with Strong Correctness Guarantees".☆41Nov 12, 2025Updated 3 months ago
- Artifact repository for the "Practical Verification of System-Software Components Written in Standard C" paper (SOSP'24)☆24May 7, 2025Updated 9 months ago
- Breaking Confidential VMs with Malicious Interrupts (USENIX Security 2024)☆33May 3, 2024Updated last year
- Anvil is an experimental framework to build practical, formally verified, cluster management controllers.☆152Updated this week
- ☆31Jun 14, 2023Updated 2 years ago
- ☆23Feb 23, 2026Updated last week
- ☆79Jan 22, 2026Updated last month
- Low level attester and verifier drivers for multiple TEEs☆26May 30, 2024Updated last year
- ☆12Jan 12, 2024Updated 2 years ago
- ☆26Dec 22, 2024Updated last year
- Protecting Accelerator Execution with Arm Confidential Computing Architecture (USENIX Security 2024)☆27Dec 11, 2023Updated 2 years ago
- A memory allocator verified with Verus☆30Feb 18, 2026Updated 2 weeks ago
- ☆13May 10, 2024Updated last year
- This repo tracks a compatible state of all sev step components and contains script to easily install everything required to setup a sev v…☆43Feb 15, 2024Updated 2 years ago
- P4Control: Line-Rate Cross-Host Attack Prevention via In-Network Information Flow Control Enabled by Programmable Switches and eBPF☆11May 20, 2024Updated last year
- ☆22Feb 25, 2026Updated last week
- Deploy the SC2 system on Kubernetes.☆10May 7, 2025Updated 9 months ago
- BS3: Block device in S3☆13Apr 19, 2022Updated 3 years ago
- COCONUT-SVSM☆204Updated this week
- ☆14Jun 11, 2020Updated 5 years ago
- Capability-based verifier for safe Rust clients of interior mutability☆15Jul 18, 2024Updated last year
- Coordination-free distributed state kernel with nanosecond latency☆39Feb 2, 2026Updated last month
- ☆13Feb 6, 2026Updated 3 weeks ago
- A Verus compiler front-end for IDEs (derived from rust-analyzer)☆34Feb 3, 2026Updated last month
- Linux SVSM (Secure VM Service Module) for secure x86 virtualization in Rust☆141Feb 1, 2024Updated 2 years ago
- Course website for Systems Verification Fall 2024☆14Jul 10, 2025Updated 7 months ago
- Calculate AMD SEV/SEV-ES/SEV-SNP measurement for confidential computing☆73Feb 11, 2026Updated 3 weeks ago
- Microarchitectural attack development frameworks for prototyping attacks in native code (C, C++, ASM) and in the browser☆62Aug 7, 2022Updated 3 years ago
- ☆72Sep 4, 2025Updated 6 months ago
- Proof-of-concept for the paper "StackWarp: Breaking AMD SEV-SNP Integrity via Deterministic Stack-Pointer Manipulation through the CPU’s …☆90Jan 30, 2026Updated last month
- The Confidential Computing Certifier Framework consists of a client API called the Certifier-API and server-based policy evaluation calle…☆73Updated this week