riscv-admin / trusted-computing
☆22Updated last year
Alternatives and similar repositories for trusted-computing:
Users that are interested in trusted-computing are comparing it to the libraries listed below
- Group administration repository for Tech: IOPMP Task Group☆13Updated 4 months ago
- This repo holds the work area and revisions of the non-ISA specification created by the RISC-V AP-TEE TG. This specification defines the …☆55Updated last month
- RISC-V Security HC admin repo☆17Updated 3 months ago
- ☆38Updated 2 years ago
- The repo contains the SPMP architectural specification, which includes capabilities like access control of read/write/execute requests by…☆16Updated this week
- Reference implementation of Arm-CCA RMM specification☆50Updated this week
- ☆21Updated 2 years ago
- This is the main repo for Penglai.☆69Updated last year
- The MIT Sanctum processor top-level project☆28Updated 5 years ago
- ☆23Updated 2 months ago
- A rust implementation for DMTF SPDM protocol to support Confidential Computing☆31Updated last week
- ☆19Updated last week
- Implementation of flush + reload attack to extract private key from the GnuPG implementation of RSA.☆10Updated 5 years ago
- Protecting Accelerator Execution with Arm Confidential Computing Architecture (USENIX Security 2024)☆26Updated last year
- Risc-V hypervisor for TEE development☆113Updated last week
- Security Test Benchmark for Computer Architectures☆21Updated 2 months ago
- Library for Prime+Probe cache side-channel attacks on L1 and L2☆34Updated 4 years ago
- ☆86Updated last week
- Trust Domain Extensions (TDX) is introducing new, architectural elements to help deploy hardware-isolated, virtual machines (VMs) called …☆59Updated last week
- Microscope: Enabling Microarchitectural Replay Attacks☆19Updated 4 years ago
- MultiZone® Security TEE is the quick and safe way to add security and separation to any RISC-V processors. The RISC-V standard ISA doesn'…☆85Updated last year
- RISC-V Security Model☆30Updated last month
- A behavioural cache model for analysing the cache behaviour under side-channel attack.☆25Updated 7 months ago
- ☆21Updated last year
- The artifact for SecSMT paper -- Usenix Security 2022☆27Updated 2 years ago
- ☆33Updated last year
- Streamline Covert Channel Attack (presented in ASPLOS'21)☆20Updated 4 years ago
- ProSpeCT: Provably Secure Speculation for the Constant-Time Policy.☆17Updated 3 weeks ago
- Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution☆31Updated 7 years ago
- ☆16Updated 5 months ago