opencomputeproject / OCP-Security-SAFE
☆12Updated last week
Alternatives and similar repositories for OCP-Security-SAFE:
Users that are interested in OCP-Security-SAFE are comparing it to the libraries listed below
- CoRIM and CoMID manipulation library and CLI☆11Updated this week
- A rust implementation for DMTF SPDM protocol to support Confidential Computing☆25Updated this week
- Calculate AMD SEV/SEV-ES/SEV-SNP measurement for confidential computing☆57Updated 7 months ago
- An on-device confidential computing platform☆105Updated 2 weeks ago
- Proof-of-concept implementation of the "Challenge/Response Remote Attestation" interaction model of the IETF RATS Reference Interaction M…☆31Updated 3 months ago
- Device Identifier Composition Engine☆11Updated 2 years ago
- COCONUT-SVSM☆135Updated this week
- ☆38Updated this week
- ARCHIE is a QEMU-based architecture-independent fault evaluation tool, that is able to simulate transient and permanent instruction and d…☆21Updated 8 months ago
- ☆18Updated 3 weeks ago
- Tutorials from TPM.dev members☆96Updated 6 months ago
- ☆20Updated 2 years ago
- ☆36Updated 2 weeks ago
- Miscellaneous materials related to the "attested TLS" proof-of-concept☆16Updated last year
- ☆60Updated last week
- Implementation of flush + reload attack to extract private key from the GnuPG implementation of RSA.☆10Updated 5 years ago
- ☆16Updated last year
- Confidential Computing Consortium Governance Documents☆74Updated this week
- Scripts, plugins, and information for working with Samsung's Shannon baseband.☆152Updated 6 months ago
- ☆93Updated last year
- ☆122Updated this week
- AMD SEV Tool☆81Updated last year
- This repo tracks a compatible state of all sev step components and contains script to easily install everything required to setup a sev v…☆33Updated 11 months ago
- Simple and scalable Linux tools for verifying TPM-based remote attestations 🔬⚖️🔐⛓📏📜☆21Updated 3 years ago
- Trust Domain Extensions (TDX) is introducing new, architectural elements to help deploy hardware-isolated, virtual machines (VMs) called …☆53Updated 2 months ago
- Formal specification of attestation mechanisms in Confidential Computing☆17Updated 5 months ago
- Linux Security Hardening for Confidential Compute☆66Updated 4 months ago
- Differential Address Trace Analysis☆54Updated 10 months ago
- The Confidential Computing Certifier Framework consists of a client API called the Certifier-API and server-based policy evaluation calle…☆57Updated last month
- A microarchitectural leakage detection framework using dynamic instrumentation.☆69Updated 7 months ago