zeyu-zh / TrustFLLinks
☆19Updated 5 years ago
Alternatives and similar repositories for TrustFL
Users that are interested in TrustFL are comparing it to the libraries listed below
Sorting:
- Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware☆165Updated 2 years ago
- ExitLess services for SGX enclaves☆33Updated 5 years ago
- ☆14Updated 3 years ago
- A Compiler-based System for Secure Memory Instrumentation and Execution in Enclaves☆28Updated 4 years ago
- SGX Tutorial at CCS17: SGX Security and Privacy☆86Updated 7 years ago
- ☆31Updated 3 years ago
- ☆33Updated 3 months ago
- High-level performance analyser toolkit for Intel SGX☆39Updated 5 years ago
- Goten: GPU-Outsourcing Trusted Execution of Neural Network Training and Prediction☆32Updated 4 years ago
- ☆18Updated 2 years ago
- Deep Learning with Intel SGX☆22Updated 6 years ago
- ☆28Updated 2 years ago
- SGX protected filesystem demo☆12Updated 7 years ago
- ☆60Updated last year
- A unified testbed for evaluating different Oblivious RAM☆59Updated 2 years ago
- Privacy-preserving Federated Learning with Trusted Execution Environments☆69Updated this week
- Fast interface for SGX secure enclaves. Based on ISCA 2017 HotCalls paper☆24Updated 4 years ago
- Query compiler for secure multi-party computation.☆99Updated 4 years ago
- Example on how to use the Intel SGX implementation of AES-GCM☆28Updated 6 years ago
- SQLite database inside a secure Intel SGX enclave (Linux)☆60Updated 6 years ago
- A curated list of SGX code and resources.☆242Updated last year
- ☆49Updated last year
- runs several layers of a deep learning model in TrustZone☆90Updated 11 months ago
- Tutorial: Uncovering and mitigating side-channel leakage in Intel SGX enclaves☆51Updated 3 months ago
- Implementation of the Reusable Enclaves paper☆14Updated last year
- ☆23Updated 4 months ago
- Trusted I/O Paths for SGX Enclaves☆16Updated 5 years ago
- Secure auditing of Internet services with Intel SGX☆22Updated 4 years ago
- Compiler-based tool that protects Intel SGX applications against controlled-channel attacks☆27Updated 8 years ago
- A high-throughput oblivious storage system☆26Updated 2 years ago