intel-sgx
There are 70 repositories under intel-sgx topic.
occlum/occlum
Occlum is a memory-safe, multi-process library OS for Intel SGX
inclavare-containers/inclavare-containers
A novel container runtime, aka confidential container, for cloud-native confidential computing and enclave runtime ecosystem.
edgelesssys/ego
EGo is an open-source SDK that enables you to develop your own confidential apps in the Go programming language.
vschiavoni/sgx-papers
A list of system papers using/about Intel SGX
mithril-security/blindai
Confidential AI deployment with secure enclaves :lock:
Maxul/Awesome-SGX-Open-Source
A curated list of open-source projects that help exploit Intel SGX technology
edgelesssys/marblerun
MarbleRun is the control plane for confidential computing. Deploy, scale, and verify your confidential microservices on vanilla Kubernetes. 100% Go, 100% cloud native, 100% confidential.
hyperledger/fabric-private-chaincode
FPC enables Confidential Chaincode Execution for Hyperledger Fabric using Intel SGX.
edgelesssys/edgelessrt
Edgeless RT is an SDK and a runtime for Intel SGX. It combines top-notch Go support with simplicity, robustness and a small TCB. Developing confidential microservices has never been easier! C++17 and Rust (experimental) are also supported.
lsds/TaLoS
Efficient TLS termination inside Intel SGX enclaves for existing applications
bl4ck5un/mbedtls-SGX
mbedtls-SGX: a SGX-friendly TLS stack (ported from mbedtls)
AliyunContainerService/sgx-device-plugin
Kubernetes Device Plugin for Intel SGX
hyperledger-labs/minbft
Implementation of MinBFT consensus protocol.
datachainlab/lcp
A proxy for light client verification executed in TEE.
rupc/go-with-intel-sgx
Intel SGX with GoLang
StanPlatinum/Deflection
Derived from CAT-SGX and elf-respect: Practical and Efficient in-Enclave Verification of Privacy Compliance
provable-things/ethereum-keys-sgx
An ethereum key pair generator & transaction signer/sender using Intel SGX & Rust.
sebva/sgx-orchestrator
SGX-aware container orchestrator
James-QiuHaoran/Final-Year-Project-Website
Website for our final year project - FRING: FAST BLOCKCHAIN ON SGX-FACILITATED PEER-TO-PEER NETWORK; Project FRing includes a new peer-to-peer network protocol that improves communication performance among peers and an implementation of fast, consistent blockchain system on top of this P2P network.
180Protocol/180protocol
Confidential compute for sensitive data sharing and commercial collaboration
mustakimur/COIN-Attacks
COIN Attacks: on Insecurity of Enclave Untrusted Interfaces in SGX - ASPLOS 2020
qascade/dcr
A PoC framework to orchestrate interoperable Differentially Private Data Clean Room Services using Intel SGX hardware as root of trust.
asonnino/sgx-wallet
Simple password-wallet application based on Intel SGX for linux.
intel/confidential-computing-documentation
Documentation related to Intel's Confidential Computing offerings
thanghoang/POSUP
POSUP: Oblivious Search and Update Platform with SGX (PETS'19)
Erlang-Enclave-Thesis/sgx-erlang-extension
Exploring Methods of Protecting Confidential Erlang Workloads with Intel SGX
OpenMined/sgx-experiments
Trusted execution experiments with Intel SGX
sebva/sgx-device-plugin
Device plugin for Kubernetes that enables the usage of Intel SGX in pods.
dineshpinto/awesome-tee-blockchain
A curated list of resources for learning about Trusted Execution Environments (TEEs) in the context of blockchains.
enclaive/portainerCC
Making confidential compute docker, docker swarm and kubernetes management simple
CEA-LIST/sgntx
iDASH 2017 competition, track 2 winning team solution
oEscal/sgx-based-mix-networks
Hidden anonymization with SGX-based mixes
OSUSecLab/SGX-Enclave-Formal-Verification
Tamarin models for state continuity of SGX enclave programs
automata-network/automata-sgx-sdk
The Automata SGX SDK is a software development kit designed to help users quickly build secure enclaves on the Intel SGX platform using Rust. Powered by Automata
tsc19/fring
FRing is a geography-based P2P overlay network for fast and robust broadcast in blockchain systems.
F30/Cadote
Code for Compiler-Aided Development of Trusted Enclaves with Rust (ARES '22)