☆47Feb 13, 2026Updated 3 months ago
Alternatives and similar repositories for TEESlice-artifact
Users that are interested in TEESlice-artifact are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- TAOISM: A TEE-based Confidential Heterogeneous Deployment Framework for DNN Models☆52Apr 11, 2024Updated 2 years ago
- ☆30Oct 27, 2023Updated 2 years ago
- icml24☆14Feb 24, 2025Updated last year
- This is the official implementation of NNSplitter (ICML'23)☆12Jun 11, 2024Updated last year
- Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware☆173Mar 25, 2023Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆14Aug 17, 2024Updated last year
- Goten: GPU-Outsourcing Trusted Execution of Neural Network Training and Prediction☆34Jan 1, 2021Updated 5 years ago
- ☆10Dec 26, 2023Updated 2 years ago
- Code repository for the research paper "A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP"☆13May 17, 2022Updated 4 years ago
- runs several layers of a deep learning model in TrustZone☆94Aug 8, 2024Updated last year
- ☆31Jun 7, 2023Updated 2 years ago
- ☆16May 22, 2023Updated 2 years ago
- ☆11Dec 23, 2024Updated last year
- OpenCCA: An Open Framework to Enable Arm CCA Research☆22Sep 10, 2025Updated 8 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆32Jun 14, 2023Updated 2 years ago
- ☆31Jul 11, 2022Updated 3 years ago
- This is the main repo for Penglai.☆73Oct 12, 2023Updated 2 years ago
- ☆19Jun 26, 2021Updated 4 years ago
- AMD Secure Encrypted Virtualization☆365May 3, 2026Updated 2 weeks ago
- ☆34Nov 7, 2022Updated 3 years ago
- CIPHERH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations☆13Dec 17, 2023Updated 2 years ago
- ☆22Aug 23, 2022Updated 3 years ago
- A curated list of open-source projects that help exploit Intel SGX technology☆421Feb 9, 2026Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Implementation of the Reusable Enclaves paper☆14Sep 25, 2023Updated 2 years ago
- OLIVE: Oblivious and Differentially Private Federated Learning on TEE☆17May 10, 2023Updated 3 years ago
- Trusted Gateway: hardened router architecture with ARM TrustZone protected firewall, routing, and NIC modules.☆15Jul 19, 2022Updated 3 years ago
- GPU Admin Tools. Includes Confidential Computing controls for H100, and other functionality☆76May 7, 2026Updated last week
- Tests for verifying compliance of RMM implementations☆23Apr 28, 2026Updated 3 weeks ago
- The nbench benchmark ported to SGX.☆14Aug 4, 2019Updated 6 years ago
- Simple memory benchmarking of Intel SGX☆12Aug 22, 2016Updated 9 years ago
- Knockoff Nets: Stealing Functionality of Black-Box Models☆115Dec 8, 2022Updated 3 years ago
- Ancillary open source software to support confidential computing on NVIDIA GPUs☆314May 4, 2026Updated 2 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- SGX protected filesystem demo☆12Jul 28, 2017Updated 8 years ago
- A minimal bootstrap scheme for fast boot of serverless microVMs with AMD Secure Encrypted Virtualization (SEV)☆15Feb 7, 2024Updated 2 years ago
- Static analysis tool to detect missing and incorrect error checks in C and C++ codebases without using a priori knowledge.☆19Updated this week
- ☆10May 12, 2023Updated 3 years ago
- ExitLess services for SGX enclaves☆34Sep 10, 2019Updated 6 years ago
- Morphence: An implementation of a moving target defense against adversarial example attacks demonstrated for image classification models …☆24Aug 9, 2024Updated last year
- ☆23Jun 14, 2023Updated 2 years ago