verified-HRoT / dice-star
☆18Updated 11 months ago
Alternatives and similar repositories for dice-star:
Users that are interested in dice-star are comparing it to the libraries listed below
- Minimal RISC Extensions for Isolated Execution☆52Updated 5 years ago
- ☆30Updated last year
- Sail code model of the CHERIoT ISA☆37Updated last month
- Assured confidential execution (ACE) implements VM-based trusted execution environment (TEE) for RISC-V with focus on a formally verified…☆47Updated this week
- seL4 Device Driver Framework☆23Updated last year
- Formally-verified reference monitor for a secure isolated execution ("enclave") environment on ARM TrustZone☆104Updated 2 years ago
- A repository of tools for verifying constant-timeness☆18Updated 2 months ago
- Setup and operation guide for OPTIGA™ TPM backed remote attestation on a Linux system☆20Updated last month
- Security monitor for Keystone Enclave (mirror of riscv-pk). Will be deprecated when openSBI port is ready☆35Updated 3 years ago
- ☆35Updated 8 years ago
- This repo is used for managing conversations about Veraison features☆52Updated last year
- CoRIM and CoMID manipulation library and CLI☆11Updated this week
- Lean cryptographic library usable for bare-metal environments☆42Updated last week
- QEMU with support for CHERI☆58Updated last week
- Crypto library☆58Updated last week
- ☆29Updated 4 years ago
- ☆13Updated last month
- rmem public repo☆41Updated last month
- Fast constant-time AES implementations on 32-bit architectures☆64Updated 6 months ago
- CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives☆60Updated 9 months ago
- The MIT Sanctum processor top-level project☆28Updated 5 years ago
- Formal specification and verification of hardware, especially for security and privacy.☆126Updated 2 years ago
- An on-device confidential computing platform☆114Updated last week
- Security and Privacy Research at Microsoft☆41Updated 7 months ago
- Compiler-based tool that protects Intel SGX applications against controlled-channel attacks☆27Updated 7 years ago
- Repository for the XMSS reference code, accompanying RFC 8391, XMSS: eXtended Merkle Signature Scheme☆55Updated last year
- A rust implementation for DMTF SPDM protocol to support Confidential Computing☆29Updated this week
- ☆31Updated last year
- ☆16Updated 3 years ago
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Updated 4 years ago