riscv-non-isa / riscv-ap-tee-ioLinks
This TG will define AP-TEE-IO ABI extensions to provide Confidential VM-assigned devices with secure direct access to confidential memory as well as MMIO, removing the dependence on para-virtualized I/O.
☆12Updated 8 months ago
Alternatives and similar repositories for riscv-ap-tee-io
Users that are interested in riscv-ap-tee-io are comparing it to the libraries listed below
Sorting:
- The MIT Sanctum processor top-level project☆30Updated 5 years ago
- This repo holds the work area and revisions of the non-ISA specification created by the RISC-V AP-TEE TG. This specification defines the …☆59Updated 3 months ago
- Proof-of-concept implementation for the paper "A Security RISC: Microarchitectural Attacks on Hardware RISC-V CPUs" (IEEE S&P 2023)☆69Updated 5 months ago
- Risc-V hypervisor for TEE development☆121Updated 2 months ago
- Penglai Enclave is an open-sourced, secure and scalable TEE system for RISC-V.☆142Updated 5 months ago
- ☆23Updated 5 months ago
- ☆34Updated 2 years ago
- This is the main repo for Penglai.☆71Updated last year
- The main repo of Penglai Enclave based on RISC-V Trapped Virtual Memory (TVM).☆40Updated 2 years ago
- An on-device confidential computing platform☆119Updated this week
- ☆23Updated 3 years ago
- A rust implementation for DMTF SPDM protocol to support Confidential Computing☆36Updated last month
- Reference implementation of Arm-CCA RMM specification☆56Updated last week
- ☆33Updated 2 years ago
- Group administration repository for Tech: IOPMP Task Group☆13Updated 8 months ago
- This specification will define the RISC-V privilege ISA extensions required to support Supervisor Domain isolation for multi-tenant secur…☆60Updated 2 weeks ago
- RISC-V Security HC admin repo☆18Updated 7 months ago
- ☆38Updated 3 years ago
- The artifact for SecSMT paper -- Usenix Security 2022☆27Updated 2 years ago
- Hardware-assisted Dynamic Information Flow Tracking for Runtime Protection on RISC-V☆11Updated last year
- ☆22Updated 2 years ago
- ☆93Updated last year
- ☆111Updated 2 years ago
- ☆22Updated last year
- ☆25Updated 2 years ago
- Using Malicious #VC Interrupts to Break AMD SEV-SNP (IEEE S&P 2024)☆24Updated last year
- ☆18Updated 2 years ago
- Protecting Accelerator Execution with Arm Confidential Computing Architecture (USENIX Security 2024)☆26Updated last year
- This repo tracks a compatible state of all sev step components and contains script to easily install everything required to setup a sev v…☆42Updated last year
- Artifacts for Cascade: CPU Fuzzing via Intricate Program Generation (USENIX Security 2024)☆131Updated 11 months ago