opencomputeproject / OCP-Security-SAFE
☆11Updated last month
Related projects ⓘ
Alternatives and complementary repositories for OCP-Security-SAFE
- ☆16Updated last year
- An on-device confidential computing platform☆97Updated this week
- ☆17Updated 5 months ago
- ARCHIE is a QEMU-based architecture-independent fault evaluation tool, that is able to simulate transient and permanent instruction and d…☆20Updated 6 months ago
- High level module that implements DPE and defines high-level traits that are used to communicate with the crypto peripherals and PCRs☆16Updated last week
- ☆113Updated this week
- An open-source deterministic fault attack simulator prototype☆49Updated 3 years ago
- ☆31Updated this week
- ☆12Updated this week
- Confidential Computing Consortium Governance Documents☆69Updated last week
- Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution☆30Updated 6 years ago
- A rust implementation for DMTF SPDM protocol to support Confidential Computing☆20Updated this week
- Using Malicious #VC Interrupts to Break AMD SEV-SNP (IEEE S&P 2024)☆22Updated 6 months ago
- Ledger Donjon CTF 2020☆17Updated 2 years ago
- ☆35Updated this week
- Emulation and Feedback Fuzzing of Firmware with Memory Sanitization☆156Updated 3 years ago
- A microarchitectural leakage detection framework using dynamic instrumentation.☆68Updated 5 months ago
- A Framework for fuzzing USB Drivers by Device Emulation☆111Updated 3 years ago
- Scripts, plugins, and information for working with Samsung's Shannon baseband.☆143Updated 4 months ago
- Calculate AMD SEV/SEV-ES/SEV-SNP measurement for confidential computing☆55Updated 4 months ago
- ☆11Updated this week
- ☆18Updated 3 months ago
- ☆158Updated 3 years ago
- Platypus Educational Samples☆16Updated 3 years ago
- Microarchitectural attack development frameworks for prototyping attacks in native code (C, C++, ASM) and in the browser☆60Updated 2 years ago
- Protecting Accelerator Execution with Arm Confidential Computing Architecture (USENIX Security 2024)☆23Updated 11 months ago
- ☆15Updated 6 years ago
- The top repository for the code accompanying our paper "Mind the Gap: Studying the Insecurity of Provably Secure Embedded Trusted Executi…☆11Updated 2 years ago
- ☆12Updated 2 months ago