ya0guang / PoBF
Proof of Being Fogotten (PoBF) and PoBF-Compliant Framework (PoCF) prototypes.
☆18Updated last year
Related projects ⓘ
Alternatives and complementary repositories for PoBF
- Protecting Accelerator Execution with Arm Confidential Computing Architecture (USENIX Security 2024)☆23Updated 10 months ago
- ☆21Updated last year
- Implementation of the Reusable Enclaves paper☆12Updated last year
- COIN Attacks: on Insecurity of Enclave Untrusted Interfaces in SGX - ASPLOS 2020☆26Updated last year
- Derived from CAT-SGX and elf-respect: Practical and Efficient in-Enclave Verification of Privacy Compliance☆41Updated 2 years ago
- The implementation of the 'vSGX: Virtualizing SGX Enclaves on AMD SEV' paper☆52Updated last year
- ☆29Updated last year
- ☆30Updated 2 years ago
- ☆12Updated 3 years ago
- ☆26Updated last year
- ☆18Updated 2 months ago
- ☆30Updated 2 years ago
- ☆32Updated last year
- ☆21Updated 2 years ago
- Tutorial: Uncovering and mitigating side-channel leakage in Intel SGX enclaves☆52Updated 5 years ago
- ☆18Updated 2 years ago
- TAOISM: A TEE-based Confidential Heterogeneous Deployment Framework for DNN Models☆27Updated 6 months ago
- Low-TCB Linux Applications with SGX Enclaves☆35Updated 5 years ago
- CAMP: Compiler and Allocator-based Heap Memory Protection (USENIX Security 2024) ✨ Please give a star to https://github.com/cla7aye15I4nd…☆35Updated 3 months ago
- ☆48Updated 2 years ago
- A formally verified security module for AMD confidential VMs☆33Updated last week
- SGX protected filesystem demo☆12Updated 7 years ago
- Commodity Obfuscation Engine for Intel SGX☆20Updated 5 years ago
- ☆18Updated 2 years ago
- The nbench benchmark ported to SGX.☆14Updated 5 years ago
- This repo tracks a compatible state of all sev step components and contains script to easily install everything required to setup a sev v…☆31Updated 8 months ago
- ShadowBound: Efficient Memory Protection through Advanced Metadata Management and Customized Compiler Optimization (USENIX Security 2024)…☆22Updated 3 months ago
- CIPHERH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations☆13Updated 10 months ago
- ☆58Updated 2 years ago
- A Compiler-based System for Secure Memory Instrumentation and Execution in Enclaves☆29Updated 3 years ago