Proof of Being Fogotten (PoBF) and PoBF-Compliant Framework (PoCF) prototypes.
☆22Aug 7, 2023Updated 2 years ago
Alternatives and similar repositories for PoBF
Users that are interested in PoBF are comparing it to the libraries listed below
Sorting:
- A POSIX Filesystem for Enclaves with a Mechanized Safety Proof☆17Sep 20, 2019Updated 6 years ago
- Practical and Efficient in-TEE Verification of Privacy Compliance☆46Jan 10, 2025Updated last year
- ☆28Mar 4, 2025Updated last year
- The nbench benchmark ported to SGX.☆14Aug 4, 2019Updated 6 years ago
- Implementation of the Reusable Enclaves paper☆14Sep 25, 2023Updated 2 years ago
- ☆32Jul 11, 2022Updated 3 years ago
- ☆40Jan 5, 2026Updated last month
- ☆31Jun 14, 2023Updated 2 years ago
- This is a collection of sidecar containers that can be incorporated within confidential container groups on Azure Container Instances.☆19Jul 27, 2023Updated 2 years ago
- ☆21Sep 7, 2022Updated 3 years ago
- pKVM POC for x86☆31Updated this week
- ☆22Dec 2, 2022Updated 3 years ago
- eBPF Processor for Ghidra☆20Apr 10, 2022Updated 3 years ago
- The implementation of the 'vSGX: Virtualizing SGX Enclaves on AMD SEV' paper☆56Nov 7, 2023Updated 2 years ago
- PrivacyGo Data Clean Room (PGDCR) is an open-source project for easily building and deploying data collaboration framework to the cloud u…☆35Oct 31, 2024Updated last year
- Trust Domain Extensions (TDX) is introducing new, architectural elements to help deploy hardware-isolated, virtual machines (VMs) called …☆94Aug 13, 2025Updated 6 months ago
- An Open and Cross-platform Trusted Execution Environment.☆150Sep 27, 2024Updated last year
- Jinzhao Disk (JinDisk) is a log-structured secure block device for TEEs. This repo is JinDisk's Linux version.☆36May 26, 2023Updated 2 years ago
- Jinzhao Attest provides unified attestation workflow for TEE compatibility, usability and security.☆36Dec 18, 2023Updated 2 years ago
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆90Sep 18, 2025Updated 5 months ago
- ☆33Dec 26, 2025Updated 2 months ago
- The artifact for NDSS '25 paper "ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environmen…☆14Oct 16, 2025Updated 4 months ago
- ☆11May 19, 2022Updated 3 years ago
- Implementing from scratch a search engine for the French Wikipedia☆10Feb 22, 2019Updated 7 years ago
- The main repo of Penglai Enclave based on RISC-V Trapped Virtual Memory (TVM).☆41Jun 5, 2023Updated 2 years ago
- Veracruz branches of https://gitlab.com/arm-research/security/icecap/icecap☆19Jan 22, 2024Updated 2 years ago
- P4Control: Line-Rate Cross-Host Attack Prevention via In-Network Information Flow Control Enabled by Programmable Switches and eBPF☆11May 20, 2024Updated last year
- LaTeX package to Do The Right Thing☆13Sep 8, 2021Updated 4 years ago
- Page Cache Side Channel Attacks (CVE-2019-5489) proof of concept for Linux☆10Oct 2, 2021Updated 4 years ago
- A toy WebAssembly(wasm) interpreter written in Swift☆16Jan 25, 2025Updated last year
- Security tools and resources☆11Dec 29, 2018Updated 7 years ago
- ☆11Jun 10, 2024Updated last year
- ☆15Sep 4, 2020Updated 5 years ago
- ☆22Feb 25, 2026Updated last week
- MQT-TZ Fork of the Open Source mosquitto MQTT broker leveraging ARM TrustZone. https://mosquitto.org☆11Jul 23, 2020Updated 5 years ago
- Analysis of "flash loan attack" from YouTuber https://www.youtube.com/watch?v=HynfsKoFlaw&t=105s☆11Jul 5, 2021Updated 4 years ago
- A collection of tools to measure and analyze MEV across Layer-2 Rollups (CCS 2024).☆15Oct 25, 2024Updated last year
- Linux porting to NonTrivialMIPS (based on linux-stable)☆12Aug 17, 2019Updated 6 years ago
- ☆14Nov 11, 2025Updated 3 months ago