verified-HRoT / dice-star
☆17Updated 5 months ago
Related projects ⓘ
Alternatives and complementary repositories for dice-star
- Minimal RISC Extensions for Isolated Execution☆50Updated 5 years ago
- seL4 Device Driver Framework☆23Updated 11 months ago
- This repo is used for managing conversations about Veraison features☆52Updated 9 months ago
- This repo holds the work area and revisions of the non-ISA specification created by the RISC-V AP-TEE TG. This specification defines the …☆50Updated last month
- ☆35Updated 7 years ago
- ☆29Updated 7 months ago
- A rust implementation for DMTF SPDM protocol to support Confidential Computing☆20Updated this week
- A repository of tools for verifying constant-timeness☆12Updated last month
- ☆29Updated 4 years ago
- A microarchitectural leakage detection framework using dynamic instrumentation.☆68Updated 5 months ago
- Crypto library☆52Updated last month
- Differential Address Trace Analysis☆54Updated 7 months ago
- Formally-verified reference monitor for a secure isolated execution ("enclave") environment on ARM TrustZone☆103Updated 2 years ago
- Assured confidential execution (ACE) implements VM-based trusted execution environment (TEE) for RISC-V with focus on a formally verified…☆30Updated 3 weeks ago
- CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives☆58Updated 4 months ago
- Robust Internet of Things, Microsoft Research☆81Updated last year
- a rust version SPDM protocol implementation☆14Updated last year
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Updated 4 years ago
- An implementation of the IETF QUIC protocol in F*☆18Updated 5 years ago
- This repo tracks a compatible state of all sev step components and contains script to easily install everything required to setup a sev v…☆31Updated 8 months ago
- Vehicular component authentication and software isolation☆11Updated 2 years ago
- Language for high-assurance and high-speed cryptography☆268Updated this week
- Compiler-based tool that protects Intel SGX applications against controlled-channel attacks☆27Updated 7 years ago
- ARCHIE is a QEMU-based architecture-independent fault evaluation tool, that is able to simulate transient and permanent instruction and d…☆20Updated 6 months ago
- A formally verified security module for AMD confidential VMs☆34Updated 2 weeks ago
- Calculate AMD SEV/SEV-ES/SEV-SNP measurement for confidential computing☆55Updated 4 months ago
- Formal specification of attestation mechanisms in Confidential Computing☆14Updated 2 months ago
- ☆11Updated this week
- The MIT Sanctum processor top-level project☆27Updated 4 years ago
- Circuits and hardware security modules formally verified with Knox 🔐☆23Updated 7 months ago