Building Distributed Enclave Applications with Sancus and SGX
☆16Dec 9, 2020Updated 5 years ago
Alternatives and similar repositories for tutorial-dsn18
Users that are interested in tutorial-dsn18 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Vehicular component authentication and software isolation☆13Nov 29, 2021Updated 4 years ago
- Simple memory benchmarking of Intel SGX☆12Aug 22, 2016Updated 9 years ago
- Experimental setup of "Intel MPX explained"☆29Feb 4, 2020Updated 6 years ago
- ☆28Sep 9, 2020Updated 5 years ago
- Resillent Control-Flow Attestation☆13Sep 30, 2021Updated 4 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Constant-time choose between two variables in Clang/LLVM☆20Apr 14, 2018Updated 7 years ago
- ☆11Aug 28, 2024Updated last year
- Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs☆16Nov 7, 2022Updated 3 years ago
- ☆13Apr 9, 2022Updated 4 years ago
- MCFI/PICFI tool chain☆45Mar 21, 2024Updated 2 years ago
- Secure ZooKeeper using Intel SGX☆22Jan 12, 2017Updated 9 years ago
- A fix to no audo problem with nexus 4 and cyanogenmod 11☆12Feb 2, 2015Updated 11 years ago
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- Accompanying material for C-FLAT: Control Flow Attestation for Embedded Systems Software☆45Aug 12, 2016Updated 9 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Secure auditing of Internet services with Intel SGX☆23Apr 30, 2021Updated 4 years ago
- A migration for the page table entry based side-channel attack agains SGX enclaves.☆19Feb 10, 2025Updated last year
- A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes☆46Sep 2, 2023Updated 2 years ago
- OpenCCA: An Open Framework to Enable Arm CCA Research☆21Sep 10, 2025Updated 7 months ago
- Hardware-assisted Data-flow Isolation☆29Jan 28, 2018Updated 8 years ago
- ☆12Feb 22, 2021Updated 5 years ago
- NEON implementation of NIST lattice-based PQC finalists☆23Oct 15, 2021Updated 4 years ago
- ☆13Oct 17, 2021Updated 4 years ago
- A collection of code based on LLVM/Clang compilation libraries and tools☆39Jan 15, 2020Updated 6 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Dynamic binary instrumentation based crypto detection framework. Implementation of http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumbe…☆18Feb 22, 2013Updated 13 years ago
- A Python wrapper for Komoot APIs☆17Apr 2, 2025Updated last year
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆14Oct 30, 2025Updated 5 months ago
- ☆10Jan 16, 2020Updated 6 years ago
- The top repository for the code accompanying our paper "Mind the Gap: Studying the Insecurity of Provably Secure Embedded Trusted Executi…☆16Aug 3, 2022Updated 3 years ago
- Cyber-Physical Inconsistency Identification for Safety Checks in Robotic Vehicles☆10Oct 13, 2022Updated 3 years ago
- ☆16May 20, 2019Updated 6 years ago
- SMVs: Enforcing Least Privilege Memory Views for Multithreaded Applications☆13Jul 7, 2022Updated 3 years ago
- Implementation of cryptographic primitives in Go☆13Mar 13, 2023Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆13Feb 12, 2025Updated last year
- ☆17Jun 25, 2017Updated 8 years ago
- ☆16Oct 10, 2025Updated 6 months ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- A fuzzer setup to fuzz libc functions.☆16Aug 30, 2022Updated 3 years ago
- ☆15Feb 18, 2025Updated last year
- Protecting user secrets from compromised browsers and operating systems☆18Sep 14, 2018Updated 7 years ago