sslab-gatech / open-tdxLinks
☆43Updated 3 months ago
Alternatives and similar repositories for open-tdx
Users that are interested in open-tdx are comparing it to the libraries listed below
Sorting:
- Trust Domain Extensions (TDX) is introducing new, architectural elements to help deploy hardware-isolated, virtual machines (VMs) called …☆88Updated 5 months ago
- Calculate AMD SEV/SEV-ES/SEV-SNP measurement for confidential computing☆71Updated 4 months ago
- This repo tracks a compatible state of all sev step components and contains script to easily install everything required to setup a sev v…☆44Updated last year
- Protecting Accelerator Execution with Arm Confidential Computing Architecture (USENIX Security 2024)☆26Updated 2 years ago
- Using Malicious #VC Interrupts to Break AMD SEV-SNP (IEEE S&P 2024)☆26Updated last year
- ☆30Updated this week
- ☆28Updated 10 months ago
- Microscope: Enabling Microarchitectural Replay Attacks☆20Updated 5 years ago
- Software Artifacts for the paper "TDXdown: Single-Stepping and Instruction Counting Attacks against Intel TDX"☆19Updated last year
- The implementation of the 'vSGX: Virtualizing SGX Enclaves on AMD SEV' paper☆56Updated 2 years ago
- Linux kernel source tree☆31Updated this week
- ☆93Updated 3 weeks ago
- An on-device confidential computing platform☆135Updated last month
- Implementation of the Reusable Enclaves paper☆14Updated 2 years ago
- ☆30Updated 2 years ago
- ☆40Updated 3 weeks ago
- A rust implementation for DMTF SPDM protocol to support Confidential Computing☆49Updated last week
- ☆42Updated 4 months ago
- ☆34Updated 3 years ago
- ☆22Updated 3 years ago
- Breaking Confidential VMs with Malicious Interrupts (USENIX Security 2024)☆34Updated last year
- Open-source release of "Last-Level Cache Side-Channel Attacks Are Feasible in the Modern Public Cloud" (ASPLOS '24)☆33Updated 10 months ago
- Compiler-based tool that protects Intel SGX applications against controlled-channel attacks☆26Updated 8 years ago
- ☆71Updated 3 years ago
- ☆119Updated 3 years ago
- Reference implementation of Arm-CCA RMM specification☆70Updated this week
- Proof-of-concept code for the IEEE S&P 2025 paper "Peek-a-Walk: Leaking Secrets via Page Walk Side Channels"☆31Updated 7 months ago
- Streamline Covert Channel Attack (presented in ASPLOS'21)☆22Updated 4 years ago
- The Confidential Computing Certifier Framework consists of a client API called the Certifier-API and server-based policy evaluation calle…☆72Updated this week
- ☆22Updated 3 years ago