ziqi-zhang / TAOISMView external linksLinks
TAOISM: A TEE-based Confidential Heterogeneous Deployment Framework for DNN Models
☆50Apr 11, 2024Updated last year
Alternatives and similar repositories for TAOISM
Users that are interested in TAOISM are comparing it to the libraries listed below
Sorting:
- ☆45Updated this week
- icml24☆14Feb 24, 2025Updated 11 months ago
- ☆29Oct 27, 2023Updated 2 years ago
- The artifact for NDSS '25 paper "ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environmen…☆14Oct 16, 2025Updated 4 months ago
- ☆14Jan 5, 2024Updated 2 years ago
- ☆34Nov 7, 2022Updated 3 years ago
- Proof of concept code for DeepSteal (SP'22) Machine Learning model extraction (weight stealing) with memory side channel☆13Jun 22, 2023Updated 2 years ago
- Open-source code and data for ShadowNet(S&P Oakland'23)☆11Mar 11, 2024Updated last year
- ☆30Jun 7, 2023Updated 2 years ago
- Trust Domain Extensions (TDX) is introducing new, architectural elements to help deploy hardware-isolated, virtual machines (VMs) called …☆92Aug 13, 2025Updated 6 months ago
- Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware☆171Mar 25, 2023Updated 2 years ago
- Goten: GPU-Outsourcing Trusted Execution of Neural Network Training and Prediction☆34Jan 1, 2021Updated 5 years ago
- ☆22Aug 23, 2022Updated 3 years ago
- Protecting Accelerator Execution with Arm Confidential Computing Architecture (USENIX Security 2024)☆26Dec 11, 2023Updated 2 years ago
- ☆10Dec 26, 2023Updated 2 years ago
- Code repository for the research paper "A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP"☆14May 17, 2022Updated 3 years ago
- Official Code Implementation for the CCS 2022 Paper "On the Privacy Risks of Cell-Based NAS Architectures"☆11Nov 21, 2022Updated 3 years ago
- For our ISSTA'23 paper ACETest: Automated Constraint Extraction for Testing Deep Learning Operators☆13Mar 30, 2024Updated last year
- Code and data for the ACM CIKM 2024 paper "Adversarial Text Rewriting for Text-aware Recommender Systems"☆12Aug 1, 2024Updated last year
- Intel confidential computing - TDX☆241Updated this week
- Ancillary open source software to support confidential computing on NVIDIA GPUs☆301Jan 24, 2026Updated 3 weeks ago
- SecretFlow-Serving is a serving system for privacy-preserving machine learning models.☆15Jan 22, 2026Updated 3 weeks ago
- Software Artifacts for the paper "TDXdown: Single-Stepping and Instruction Counting Attacks against Intel TDX"☆19Oct 14, 2024Updated last year
- ☆16Aug 31, 2021Updated 4 years ago
- [NDSS'25] The official implementation of safety misalignment.☆17Jan 8, 2025Updated last year
- Knockoff Nets: Stealing Functionality of Black-Box Models☆114Dec 8, 2022Updated 3 years ago
- Shielded Enclaves for Cloud FPGAs☆15Nov 24, 2021Updated 4 years ago
- Implementation of the Reusable Enclaves paper☆14Sep 25, 2023Updated 2 years ago
- ☆22Jul 16, 2022Updated 3 years ago
- A brand new OS that runs in various kinds of TEEs and supports Linux ABI☆16Aug 21, 2021Updated 4 years ago
- Tests for verifying compliance of RMM implementations☆21Sep 22, 2025Updated 4 months ago
- This is the official implementation of NNSplitter (ICML'23)☆12Jun 11, 2024Updated last year
- A curated list of open-source projects that help exploit Intel SGX technology☆421Feb 9, 2026Updated last week
- Run RISC-V development environment using docker☆18Feb 18, 2023Updated 2 years ago
- Rust bindings for googleprojectzero/TinyInst☆25Dec 3, 2025Updated 2 months ago
- ☆41Feb 26, 2023Updated 2 years ago
- GPUReplay, ASPLOS 2022☆41Feb 21, 2022Updated 3 years ago
- Trusted I/O Paths for SGX Enclaves☆18Apr 30, 2020Updated 5 years ago
- The published code repo for the Cortex-M SoK paper.☆26Feb 5, 2026Updated last week