trugw / TrustedGatewayLinks
Trusted Gateway: hardened router architecture with ARM TrustZone protected firewall, routing, and NIC modules.
☆14Updated 3 years ago
Alternatives and similar repositories for TrustedGateway
Users that are interested in TrustedGateway are comparing it to the libraries listed below
Sorting:
- ☆15Updated 4 months ago
- Memory Tagging ISA extension that can be used by software to enforce memory tag checks on memory loads and stores☆17Updated last week
- ☆23Updated 4 months ago
- Security Test Benchmark for Computer Architectures☆21Updated 4 months ago
- ☆32Updated 2 years ago
- Trusted I/O Paths for SGX Enclaves☆16Updated 5 years ago
- TEESec: Pre-Silicon Vulnerability Discovery for Trusted Execution Environments☆10Updated last year
- Forked from tf-rmm@trustedfirmware, support QEMU platform. Check wiki for instruction. https://github.com/Huawei/Huawei_CCA_RMM/wiki☆20Updated 2 years ago
- ☆18Updated 2 years ago
- Using Malicious #VC Interrupts to Break AMD SEV-SNP (IEEE S&P 2024)☆24Updated last year
- The top repository for the code accompanying our paper "Mind the Gap: Studying the Insecurity of Provably Secure Embedded Trusted Executi…☆14Updated 2 years ago
- Implementation of the Reusable Enclaves paper☆14Updated last year
- Reference implementation of Arm-CCA RMM specification☆55Updated last week
- ☆22Updated last year
- Breaking Confidential VMs with Malicious Interrupts (USENIX Security 2024)☆31Updated last year
- Artifacts for our ShowTime paper (AsiaCCS '23), including distinguishing cache hits and misses with the human eye.☆13Updated last year
- Proof-of-Concept of the Frontal Attack☆10Updated 2 years ago
- Proof-of-concept implementation for the paper "CacheWarp: Software-based Fault Injection using Selective State Reset" (USENIX Security 20…☆63Updated 11 months ago
- ☆34Updated last year
- Group administration repository for Tech: IOPMP Task Group☆13Updated 7 months ago
- Test suite containing a reproduction of all major transient-execution attacks in RISC-V and CHERI-RISC-V assembly☆15Updated 4 years ago
- This repository contains the hardware, software, and OS support for the Programmable Hardware Monitor (PHMon).☆26Updated 4 years ago
- Website for Research Artifacts from the Security Community☆18Updated last week
- Hardware-assisted Dynamic Information Flow Tracking for Runtime Protection on RISC-V☆10Updated last year
- The MIT Sanctum processor top-level project☆30Updated 5 years ago
- Student Starter Code for Secure Hardware Design at MIT☆77Updated last year
- Platypus Educational Samples☆20Updated 4 years ago
- caijiqhx notes☆17Updated 8 months ago
- Protecting Accelerator Execution with Arm Confidential Computing Architecture (USENIX Security 2024)☆26Updated last year
- Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture can Leak Private Data☆21Updated 2 years ago