trusted-execution-environment

There are 85 repositories under trusted-execution-environment topic.

  • wolfSSL/wolfssl

    The wolfSSL library is a small, fast, portable implementation of TLS/SSL for embedded devices to the cloud. wolfSSL supports up to TLS 1.3 and DTLS 1.3!

    Language:C2.6k1081.1k900
  • secretflow/secretflow

    A unified framework for privacy-preserving data analysis and machine learning

    Language:Python2.6k421.1k453
  • teaclave-sgx-sdk

    apache/teaclave-sgx-sdk

    Apache Teaclave™ SGX SDK helps developers to write Intel SGX applications in the Rust programming language, and also known as Rust SGX SDK.

    Language:Rust1.2k67270268
  • enovella/TEE-reversing

    A curated list of public TEE resources for learning how to reverse-engineer and achieve trusted code execution on ARM devices

  • securefederatedai/openfederatedlearning

    An Open Framework for Federated Learning.

    Language:Python81718306232
  • apache/teaclave

    Apache Teaclave™ is an open source universal secure computing platform, making computation on privacy-sensitive data safe and simple.

  • Maxul/Awesome-SGX-Open-Source

    A curated list of open-source projects that help exploit Intel SGX technology

  • Dstack-TEE/dstack

    Deploy any app to TEE.

    Language:Rust32073956
  • apache/teaclave-trustzone-sdk

    Teaclave TrustZone SDK enables safe, functional, and ergonomic development of trustlets.

    Language:Rust257248073
  • IBM/ACE-RISCV

    Assured confidential execution (ACE) implements VM-based trusted execution environment (TEE) for embedded RISC-V systems with focus on a formally verified and auditable firmware.

    Language:Rust1925119
  • edgelesssys/edgelessrt

    Edgeless RT is an SDK and a runtime for Intel SGX. It combines top-notch Go support with simplicity, robustness and a small TCB. Developing confidential microservices has never been easier! C++17 and Rust (experimental) are also supported.

    Language:C++14251519
  • Keysight/optee_fuzzer

    This repository contains the code for a fuzzing prototype for the OP-TEE system call interface using AFL.

    Language:C141111337
  • secretflow/kuscia

    Kuscia(Kubernetes-based Secure Collaborative InfrA) is a K8s-based privacy-preserving computing task orchestration framework.

    Language:Go130546196
  • scrtlabs/SafeTrace

    Privacy preserving voluntary Covid-19 self-reporting platform. Share your location history and status, get alerts you are in high risk areas and identify high risk regions

    Language:Rust127124426
  • hex-five/multizone-sdk

    MultiZone® Security TEE is the quick and safe way to add security and separation to any RISC-V processors. The RISC-V standard ISA doesn't define TrustZone-like primitives to provide hardware separation. To shield critical functionality from untrusted third-party components, MultiZone provides hardware-enforced, software-defined separation of multi

    Language:C86104925
  • skalenetwork/sgxwallet

    sgxwallet is the first-ever opensource high-performance hardware secure crypto wallet that is based on Intel SGX technology. First opensource product on Intel SGX whitelist. Scales to 100,000+ transactions per second. Currently supports ETH and SKALE, and will support BTC in the future. Sgxwallet is under heavy development and use by SKALE network.

    Language:Shell6888137
  • Samsung/mTower

    mTower is Trusted Execution Environment specially designed to be used on MicroController Units (MCUs) supporting ARM TrustZone technology (e.g., Cortex-M23/33/35p). mTower operates well under restrictions typical for such environment – small RAM and ROM sizes, relatively low performance, absence of rich OSes providing variety of services available on PCs or in enterprise environments. mTower is intended for usage in IoT, embedded devices, Smart Home applications, distributed heterogeneous networks and other environments where secure processing of sensitive data is necessary.

    Language:C6614819
  • riscv/riscv-smmtt

    This specification will define the RISC-V privilege ISA extensions required to support Supervisor Domain isolation for multi-tenant security use cases e.g. confidential-computing, trusted platform services, fault isolation and so on.

    Language:Makefile63147922
  • sentient-agi/Sentient-Enclaves-Framework

    Sentient Enclaves Framework for Confidential AI & Crypto Apps

    Language:Rust592014
  • apache/teaclave-java-tee-sdk

    Apache Teaclave (incubating) Java TEE SDK is an open source universal confidential computing framework, making java computation on privacy-sensitive data safe and simple.

    Language:Java56151517
  • evervault/enclaves

    Evervault Enclaves let you deploy your services to Trusted Execution Environments without the engineering overhead

    Language:Rust45602
  • enarx-archive/enarx.github.io

    Enarx.dev website and relevant assets

    Language:JavaScript43113028
  • dineshpinto/awesome-tee-blockchain

    A curated list of resources for learning about Trusted Execution Environments (TEEs) in the context of blockchains.

  • James-QiuHaoran/Final-Year-Project-Website

    Website for our final year project - FRING: FAST BLOCKCHAIN ON SGX-FACILITATED PEER-TO-PEER NETWORK; Project FRing includes a new peer-to-peer network protocol that improves communication performance among peers and an implementation of fast, consistent blockchain system on top of this P2P network.

    Language:HTML321017
  • secretflow/trustflow

    A privacy-preserving computing system based on TEE.

    Language:C++2756715
  • cypherpunk-symposium/decentralized-cryptography-toolkit

    👾 notes and resources on applied cryptography for decentralized protocols, both for privacy and optimization (e.g., zk, tees, fhe, mpc, provers)

  • scrtlabs/SecretHoldEm

    A Texas hold 'em poker game implemented as a Secret Contract for the Secret Network

    Language:JavaScript23608
  • hex-five/multizone-iot-sdk

    MultiZone® Trusted Firmware is the quick and safe way to build secure IoT applications with any RISC-V processor. It provides secure access to commercial and private IoT clouds, real-time monitoring, secure boot, and remote firmware updates. The built-in Trusted Execution Environment provides hardware-enforced separation ...

    Language:C20041
  • salrashid123/confidential_space

    Constructing Trusted Execution Environment (TEE) with GCP Confidential Space

    Language:Go19316
  • hex-five/multizone-linux

    MultiZone® Security Enclave for Linux

    Language:C1810512
  • Maxul/Aurora

    Trusted I/O Paths for SGX Enclaves

    Language:C18202
  • hex-five/multizone-api

    MultiZone free and open API definition

    Language:C15435
  • microsoft/ccf-app-template

    Template repository for CCF apps

    Language:C++157718
  • hex-five/multizone-sdk-arm

    MultiZone® Security TEE for Arm® Cortex®-M is the quick and safe way to add security and separation to any Cortex-M based device. MultiZone® software can retrofit existing designs. If you don’t have TrustZone®, or if you require finer granularity than one secure world, you can take advantage of high security separation without the need for hardware and software redesign, eliminating the complexity associated with managing a hybrid hardware/software security scheme.

    Language:C14121
  • kriskwiatkowski/TEE-TLS-delegator

    Solution to harden TLS security by storing private keys and delegating operations to the Trused Execution Environment

    Language:C13112
  • secretflow/trustflow-capsule-manager

    The authorization and key management module of TrustedFlow

    Language:Rust13