sslab-gatech / open-tdxLinks
☆27Updated 2 weeks ago
Alternatives and similar repositories for open-tdx
Users that are interested in open-tdx are comparing it to the libraries listed below
Sorting:
- Trust Domain Extensions (TDX) is introducing new, architectural elements to help deploy hardware-isolated, virtual machines (VMs) called …☆66Updated 3 weeks ago
- Calculate AMD SEV/SEV-ES/SEV-SNP measurement for confidential computing☆65Updated last year
- ☆24Updated last month
- This repo tracks a compatible state of all sev step components and contains script to easily install everything required to setup a sev v…☆41Updated last year
- ☆28Updated 2 years ago
- An on-device confidential computing platform☆116Updated this week
- Protecting Accelerator Execution with Arm Confidential Computing Architecture (USENIX Security 2024)☆26Updated last year
- ☆89Updated 2 weeks ago
- Software Artifacts for the paper "TDXdown: Single-Stepping and Instruction Counting Attacks against Intel TDX"☆15Updated 8 months ago
- A rust implementation for DMTF SPDM protocol to support Confidential Computing☆35Updated last week
- Linux kernel source tree☆28Updated 3 weeks ago
- ☆23Updated 4 months ago
- Ancillary open source software to support confidential computing on NVIDIA GPUs☆257Updated 3 weeks ago
- ☆40Updated this week
- Documentation related to Intel's Confidential Computing offerings☆18Updated 3 weeks ago
- Tools, scripts, and configuration files necessary to demonstrate an end-to-end remote attestation example with SEV-SNP.☆57Updated last year
- Using Malicious #VC Interrupts to Break AMD SEV-SNP (IEEE S&P 2024)☆24Updated last year
- ☆70Updated 2 years ago
- The implementation of the 'vSGX: Virtualizing SGX Enclaves on AMD SEV' paper☆55Updated last year
- The main repo of Penglai Enclave based on RISC-V Trapped Virtual Memory (TVM).☆39Updated 2 years ago
- Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution☆33Updated 7 years ago
- Compiler-based tool that protects Intel SGX applications against controlled-channel attacks☆27Updated 8 years ago
- Reference implementation of Arm-CCA RMM specification☆55Updated last week
- AMD SEV Tool☆85Updated 2 years ago
- GPU Admin Tools. Includes Confidential Computing controls for H100, and other functionality☆27Updated 3 months ago
- ☆32Updated 2 years ago
- Microscope: Enabling Microarchitectural Replay Attacks☆19Updated 5 years ago
- ☆22Updated 2 years ago
- Open-source release of "Last-Level Cache Side-Channel Attacks Are Feasible in the Modern Public Cloud" (ASPLOS '24)☆26Updated 3 months ago
- Intel confidential computing - TDX☆176Updated this week