#
tee
Here are 67 public repositories matching this topic...
Apache Teaclave (incubating) is an open source universal secure computing platform, making computation on privacy-sensitive data safe and simple.
rust
faas
sgx
trustzone
tee
function-as-a-service
trusted-execution-environment
universal-secure-computing
secure-multiparty-computation
confidential-computing
-
Updated
Nov 4, 2021 - Rust
A novel container runtime, aka confidential container, for cloud-native confidential computing and enclave runtime ecosystem.
kubernetes
cloud
runtime
containers
container
oci
cloud-native
sgx
enclave
tee
sgx-enclave
intel-sgx
oci-runtime
confidential-computing
confidential-container
trusted-applications
-
Updated
Nov 11, 2021 - C
A curated list of public TEE resources for learning how to reverse-engineer and achieve trusted code execution on ARM devices
-
Updated
Aug 7, 2020
Nailgun attack on ARM devices.
android
debugging
raspberry-pi
security
arm
attack
proof-of-concept
exploit
fingerprint
vulnerabilities
trustzone
tee
huawei-mate7
-
Updated
May 13, 2021 - C
Teaclave TrustZone SDK enables safe, functional, and ergonomic development of trustlets.
-
Updated
Nov 5, 2021 - Rust
Enigma Core library. The domain: Trusted and Untrusted App in Rust.
-
Updated
Mar 10, 2020 - Rust
MultiZone® Security TEE is the quick and safe way to add security and separation to any RISC-V processors. The RISC-V standard ISA doesn't define TrustZone-like primitives to provide hardware separation. To shield critical functionality from untrusted third-party components, MultiZone provides hardware-enforced, software-defined separation of multiple equally secure worlds. Unlike antiquated hypervisor-like solutions, MultiZone is self-contained, presents an extremely small attack surface, and it is policy driven, meaning that no coding is required – and in fact even allowed. MultiZone works with any 32-bit or 64-bit RISC-V processors with standard Physical Memory Protection unit (PMP) and “U” mode.
security
fpga
firmware
hypervisor
container
freertos
xilinx
microkernel
secure-boot
risc-v
trustzone
tee
arty
trusted-computing
sifive
multizone
trusted-execution-environment
secure-element
root-of-trust
polarfire-soc
-
Updated
Nov 8, 2021 - C
-
Updated
Oct 13, 2021 - Go
A subprocess.run drop-in replacement that supports a tee mode, being able to display output in real time while still capturing it. No dependencies needed
-
Updated
Oct 5, 2021 - Python
MultiZone® Security Enclave for Linux
linux
security
microservices
firmware
microkernel
secure-boot
risc-v
tee
trusted-computing
hex-five
trusted-execution-environment
secure-element
root-of-trust
mutizone
-
Updated
Nov 8, 2021 - C
An End-to-End Privacy Computing Protocol on Layer 2
-
Updated
Nov 10, 2021 - Rust
MultiZone free and open API definition
linux
security
risc-v
tee
linux-driver
trusted-execution
trusted-computing
freedomstudio
hex-five
multizone-security
multizone
trusted-execution-environment
freedom-e-sdk
multizone-api
-
Updated
Oct 26, 2021 - C
Content based network multiplexer or redirector made with love and Go
go
tunnel
golang
redirects
tools
networking
tool
network
connection-pool
tee
network-multiplexer
connection-tee
-
Updated
Nov 16, 2018 - Go
MultiZone® Security Trusted Firmware is the quick and safe way to build secure IoT applications with any RISC-V processor. It provides secure access to commercial and private IoT clouds, real-time monitoring, secure boot, and remote firmware updates. The built-in Trusted Execution Environment provides hardware-enforced separation to shield the execution of trusted applications from untrusted 3rd party libraries.
tls
mqtt
iot
firmware
iot-platform
freertos
lwip
tcp-ip
secure-boot
mbedtls
risc-v
firmware-updates
trustzone
tee
iot-device
trusted-computing
multizone
trusted-execution-environment
firmware-security
-
Updated
Nov 8, 2021 - C
Trusted execution experiments with Intel SGX
python
security
intel
pytorch
secure
graphene
experiments
confidentiality
sgx
tee
secure-computation
intel-sgx
trusted-execution-environment
confidential-computing
-
Updated
Jun 17, 2020 - Makefile
Solution to harden TLS security by storing private keys and delegating operations to the Trused Execution Environment
-
Updated
Dec 14, 2020 - C
Improve this page
Add a description, image, and links to the tee topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the tee topic, visit your repo's landing page and select "manage topics."
As described in #275, please help me with the documentation of SGX SDK:
/documents/directory/documents/directoryThis documents will be rendered in our homepage (https://teaclave.apache.org/sgx-sdk-docs/). Thank you so much!