sc2-sys / deployLinks
Deploy the SC2 system on Kubernetes.
☆10Updated 6 months ago
Alternatives and similar repositories for deploy
Users that are interested in deploy are comparing it to the libraries listed below
Sorting:
- A minimal bootstrap scheme for fast boot of serverless microVMs with AMD Secure Encrypted Virtualization (SEV)☆14Updated last year
- Jinzhao Disk (JinDisk) is a log-structured secure block device for TEEs. This repo is JinDisk's Linux version.☆36Updated 2 years ago
- ☆72Updated 2 years ago
- ☆14Updated 2 weeks ago
- Multilayered, Log-structured Secure Disk (MlsDisk) protects the disk I/O for TEEs☆18Updated last year
- rkt-io Library OS for running Linux applications inside of Intel SGX enclaves☆34Updated 3 years ago
- The Intel® Software Guard Extensions Enclave Memory Manager is a module designed to manage dynamic memory within an SGX runtime.☆27Updated 8 months ago
- Linux SVSM (Secure VM Service Module) for secure x86 virtualization in Rust☆141Updated last year
- Confidential Containers Shim Firmware☆115Updated this week
- ☆23Updated 3 years ago
- ☆43Updated this week
- ☆28Updated this week
- ☆28Updated 2 years ago
- A formally verified security module for AMD confidential VMs☆58Updated last week
- A library OS for Linux multi-process applications, with Intel TDX support (experimental)☆42Updated 3 weeks ago
- COCONUT-SVSM☆184Updated this week
- The nbench benchmark ported to SGX.☆14Updated 6 years ago
- Next-Gen Occlum, a work-in-progress fork of Occlum that is optimized for the next-generation of Intel SGX (on Xeon SP processors)☆35Updated 2 years ago
- A suite of representative serverless cloud-agnostic (i.e., dockerized) benchmarks☆57Updated this week
- Implementation of the Reusable Enclaves paper☆14Updated 2 years ago
- GPU Admin Tools. Includes Confidential Computing controls for H100, and other functionality☆41Updated last month
- The implementation of the 'vSGX: Virtualizing SGX Enclaves on AMD SEV' paper☆56Updated 2 years ago
- ☆42Updated 2 months ago
- Trust Domain Extensions (TDX) is introducing new, architectural elements to help deploy hardware-isolated, virtual machines (VMs) called …☆84Updated 3 months ago
- This artifact accompanies the paper 'Pronghorn: Effective Checkpoint Orchestration for Serverless Hot-Starts,' which has been accepted fo…☆20Updated 2 years ago
- Protecting Accelerator Execution with Arm Confidential Computing Architecture (USENIX Security 2024)☆26Updated last year
- Trusted in-memory key-value store based on ShieldStore which is published in EuroSys 2019☆39Updated 3 years ago
- ☆32Updated 3 years ago
- ☆91Updated last month
- Calculate AMD SEV/SEV-ES/SEV-SNP measurement for confidential computing☆70Updated 2 months ago