A curated list of public TEE resources for learning how to reverse-engineer and achieve trusted code execution on ARM devices
-
Updated
Jul 8, 2024
A curated list of public TEE resources for learning how to reverse-engineer and achieve trusted code execution on ARM devices
A curated list of open-source projects that help exploit Intel SGX technology
Tutorial and base project: TEE on AMD Zynq UltraScale+ using Arm TrustZone
A repository of larger example Veracruz computations
Proof-of-Concept of SH3ARS as presented in the 2025 RAID paper "SH3ARS: Privilege Reduction for ARMv8.0-A Secure Monitors".
Proof-of-Concept of "Conditional Network Availability" as presented in the 2024 SysTEX workshop paper "Conditional Network Availability: Enhancing Connectivity Guarantees for TEE-Based Services".
Proof-of-Concept of TeeFilter as presented in the 2024 ASIA CCS paper "TeeFilter: High-Assurance Network Filtering Engine for High-End IoT and Edge Devices based on TEEs".
Toy project to understand how openenclave works :)
Secure TLS server with integrated remote attestation (RA-TLS) using Open Enclave (Intel SGX & ARM TrustZone)
Intel SGX Benchmark
OpenEnclave in Java using JNI
Add a description, image, and links to the arm-trustzone topic page so that developers can more easily learn about it.
To associate your repository with the arm-trustzone topic, visit your repo's landing page and select "manage topics."