Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
awesome-tee-blockchain
A curated list of resources for learning about Trusted Execution Environments (TEEs) in the context of blockchains.
https://github.com/dineshpinto/awesome-tee-blockchain
Last synced: 5 days ago
JSON representation
-
Use Cases
-
Asset Management
-
Privacy
-
Block Building
-
Bridging
- Website - labs GitHub](https://github.com/ava-labs)
-
General Compute
-
Rollups
-
-
Repositories
-
Rust
- marlinprotocol/oyster-serverless - Oyster Serverless is a cutting-edge, high-performance serverless computing platform designed to securely execute JavaScript (JS) and WebAssembly (WASM) code in a highly controlled environment.
- Phala-Network/phala-blockchain - The Phala Network Blockchain, pRuntime and the bridge.
- kata-containers/kata-containers - Kata Containers is an open source project and community working to build a standard implementation of lightweight Virtual Machines (VMs) that feel and perform like containers, but provide the workload isolation and security advantages of VMs.
- taikoxyz/raiko - Multi-proofs for Taiko. SNARKS, STARKS and Trusted Execution Enclave.
- confidential-containers/guest-components - Confidential Containers Guest Tools and Components
- kinvolk/azure-cvm-tooling - Libraries and tools for Confidential Computing on Azure
- HyperEnclave/hyperenclave - An Open and Cross-platform Trusted Execution Environment.
- mobilecoinfoundation/mobilecoin - Private payments for mobile devices
- integritee-network/worker - Integritee off-chain worker and sidechain validateer
- capsule-corp-ternoa/ternoa-node - Ternoa's Node Implementation
- automata-network/automata - Automata Network is a modular attestation layer that extends machine trust to Ethereum with TEE Coprocessors.
- apache/incubator-teaclave-sgx-sdk - Apache Teaclave (incubating) SGX SDK helps developers to write Intel SGX applications in the Rust programming language, and also known as Rust SGX SDK.
- apache/incubator-teaclave - Apache Teaclave (incubating) is an open source universal secure computing platform, making computation on privacy-sensitive data safe and simple.
- scrtlabs/incubator-teaclave-sgx-sdk - Rust SGX SDK provides the ability to write Intel SGX applications in Rust Programming Language. Fork of `apache/incubator-teaclave-sgx-sdk`.
-
Go
- google/go-tpm-tools - Go packages built on go-tpm providing a high-level API for using TPMs
- google/go-sev-guest - go-sev-guest offers a library to wrap the /dev/sev-guest device in Linux, as well as a library for attestation verification of fundamental components of an attestation report.
- google/go-tdx-guest - go-tdx-guest offers a library to wrap the /dev/tdx-guest device in Linux, as well as a library for attestation verification of fundamental components of an attestation quote.
- matter-labs/vault-auth-tee - Hashicorp Vault plugin for authenticating Trusted Execution Environments (TEE) like SGX enclaves
- usbarmory/GoTEE - Go Trusted Execution Environment (TEE)
- iotexproject/w3bstream - An offchain computing layer for DePIN verifiable data computation, supporting a variety of validity proofs including Zero Knowledge (ZK), Trusted Execution Environments (TEE), and Multi-party Computation (MPC)
- oasisprotocol/oasis-core - Performant and Confidentiality-Preserving Smart Contracts + Blockchains
- hyperledger/fabric-private-chaincode - FPC enables Confidential Chaincode Execution for Hyperledger Fabric using Intel SGX.
-
CPP
- microsoft/azure-tee-attestation-samples - Trusted Execution Environment examples leveraging attestations on Azure
- intel/linux-sgx - Intel SGX for Linux
- lsds/Teechain - Teechain: A Secure Payment Network with Asynchronous Blockchain Access
- skalenetwork/sgxwallet - sgxwallet is the first-ever opensource high-performance hardware secure crypto wallet that is based on Intel SGX technology. First opensource product on Intel SGX whitelist. Scales to 100,000+ transactions per second. Currently supports ETH and SKALE, and will support BTC in the future. Sgxwallet is under heavy development and use by SKALE network.
- hyperledger-labs/private-data-objects - The Private Data Objects lab provides technology for confidentiality-preserving, off-chain smart contracts.
-
C
- openenclave/openenclave - SDK for developing enclaves
- deislabs/mystikos - Tools and runtime for launching unmodified container images in Trusted Execution Environments
- mofanv/PPFL - Privacy-preserving Federated Learning with Trusted Execution Environments
- inclavare-containers/inclavare-containers - A novel container runtime, aka confidential container, for cloud-native confidential computing and enclave runtime ecosystem.
- pietroborrello/CustomProcessingUnit - The first analysis framework for CPU microcode
- iisec-suzaki/optee-ra - OP-TEE Remote Attestation
-
Python
- ethernity-cloud/mvp-pox-node - Ethernity Cloud Node
-
TS
- tkhq/sdk - Turnkey TypeScript SDK
-
General
- sbellem/qtee - Exploring the physical limits of trusted hardware in the classical and quantum settings to achieve security through physics.
-
-
Articles
-
TS
- Demystifying SGX — Part 1 - Obscuro Labs
- Trusted Execution Environments and the Polkadot Ecosystem
- Verifiable Off-chain Compute - Florin Digital
- Sirrah: Speedrunning a TEE Coprocessor
- Blockchain Privacy and Security in Data Computation
- 4 Ways to Compare Trusted Execution Environments and Zero-Knowledge Proofs
- What is a Trusted Execution Environment (TEE)? - Halborn
- How Secret Network Uses SGX
- Blockchain × TEE: Why Various Forefront Projects are Adopting TEE - TOKI
- Why trusted execution environments will be integral to proof-of-stake blockchains
- TEE-based Smart Contracts and Sealing Pitfalls
- Blockchains in Trusted Execution Environments (TEEs)
- Intel SGX and Blockchain: The iExec End-to-End Trusted Execution Solution
- Blockchains + TEEs Day 1 Summary
- Blockchains + TEEs Day 2 Summary
- Intel SGX Explained
- TDX Security For BOB Searchers, Flashbots
- Chapter 3 - Verifiable Off-chain Compute: Enabling an Instagram-like experience for Web3 - Florin Digital
- A few notes on AWS Nitro Enclaves: Attack surface - Trail of Bits Blog
- Early Thoughts on Decentralized Root-of-Trust - Flashbots Collective
- Drawbacks In FHE Blockchain And How TEE Can Help It - Flashbots Collective
- Building Secure Ethereum Blocks on Minimal Intel TDX Confidential VMs - Flashbots Collective
-
Python
-
-
Tweet threads
-
Videos
-
TS
- How to Win Friends and TEE-fluence People - Ethan Buchman, Modular Summit 2024
- DEVMOS 2024: Dylan Kawalec (Osmosis), 'Building Decentralized Frontends', Modular Summit 2024
- The TEE Stack - Andrew Miller, Modular Summit 2024
- Parallelized Confidential Computing - Yannik Schrade, Fil Dev Summit 2024
- TEE for Blockchain Applications - Ari Juels, a16z crypto 2023
- Private Smart Contracts are Worth the Price of the SGX - Andrew Miller, ETHDenver 2023
- Protected Order Flow for Fair Transaction-Ordering in a Profit-Seeking World - Kushal Babel, MEV-SBC 2023
- Blockchains + TEEs 2023: Day 1 - Kartik Nayan, Ittai Abraham, Aniket Kate
- Blockchains + TEEs 2023: Day 2 - Kartik Nayan, Ittai Abraham, Aniket Kate
- SGX Panel 2023: Andrew Miller, Jonathan Passerat Palmbach, Phil Daian, Justin Drake
- Enabling Cross Chain Transfers Using SGX - Michael Kaplan, Avalanche Summit 2022
- Trusted Execution Environments Meet the Blockchain - Ittay Eyal, Simons Institute 2019
- What apps are unlocked by the TEE stack - Xinyuan Sun, Modular Summit 2024
- Phala Network: 'The Magic of TEEs' - Online Workshop on TEE Basics
-
Python
- How to Win Friends and TEE-fluence People - Ethan Buchman, Modular Summit 2024
- DEVMOS 2024: Dylan Kawalec (Osmosis), 'Building Decentralized Frontends', Modular Summit 2024
- The TEE Stack - Andrew Miller, Modular Summit 2024
- Parallelized Confidential Computing - Yannik Schrade, Fil Dev Summit 2024
- TEE for Blockchain Applications - Ari Juels, a16z crypto 2023
- Private Smart Contracts are Worth the Price of the SGX - Andrew Miller, ETHDenver 2023
- Protected Order Flow for Fair Transaction-Ordering in a Profit-Seeking World - Kushal Babel, MEV-SBC 2023
- Blockchains + TEEs 2023: Day 1 - Kartik Nayan, Ittai Abraham, Aniket Kate
- Blockchains + TEEs 2023: Day 2 - Kartik Nayan, Ittai Abraham, Aniket Kate
- SGX Panel 2023: Andrew Miller, Jonathan Passerat Palmbach, Phil Daian, Justin Drake
- Enabling Cross Chain Transfers Using SGX - Michael Kaplan, Avalanche Summit 2022
- Trusted Execution Environments Meet the Blockchain - Ittay Eyal, Simons Institute 2019
-
-
Hardware
-
AMD
- Secure Encrypted Virtualization-Trusted I/O (SEV-TIO) - Improved I/O performance and security in AMD SEV-SNP guests
- Secure Encrypted Virtualization-Secure Nested Paging (SEV-SNP) - Expands on SEV, adds memory integrity protection to help prevent malicious hypervisor-based attacks
- Secure Encrypted Virtualization (SEV) - Hardware-based memory encryption through the AMD Secure Processor
-
Intel
- Advanced Matrix Extensions (AMX) - Accelerator to improve the performance of deep-learning training and inference on the CPU
- Trust Domain Extensions (TDX) - Latest Hardware-based TEE architecture from Intel
- Software Guard Extensions (SGX) - Protects data actively being used in the processor and memory by creating a TEE
-
NVIDIA
- H100 TensorCore GPU - Hardware-based trusted execution environment with NVIDIA Hopper and NVIDIA Blackwell architecture support
- Hopper Architecture - Accelerated computing platform for AI
- Blackwell Architecture - Latest HW generation with accelerated computing and generative AI optimizations
-
ARM
- Confidential Compute Architecture (CCA) - Under development. Key component of the Armv9-A architecture
- TrustZone - Isolates critical security firmware, assets and private information for Armv8-M based devices
-
-
Cloud Providers
-
Google Cloud Confidential Compute
- Confidential Accelerator for AI workloads - Supports Intel TDX with Intel AMX, and NVIDIA H100 GPUs.
- Confidential VMs - Supports AMD SEV, AMD SEV-SNP, and Intel TDX.
- Confidential Space - Supports trust model where the workload author, workload operator, and resource owners are separate, mutually distrusting parties.
- Confidential VM attestation - Attestation support for AMD SEV (vTPM), AMD SEV-SNP (vTPM and TSM), and Intel TDX (vTPM and TSM).
-
Microsoft Azure Confidential Computing
-
Amazon AWS Nitro
-
-
Research Papers
Categories
Sub Categories
Keywords
sgx
7
tee
5
blockchain
5
confidential-computing
4
rust
3
trusted-execution-environment
3
containers
2
privacy
2
docker
2
kubernetes
2
tpm2
2
oci
2
security
2
intel-sgx
2
universal-secure-computing
2
faas
1
function-as-a-service
1
secure-multiparty-computation
1
trustzone
1
go
1
golang
1
remote-attestation
1
node
1
azure
1
attestation
1
virtualization
1
virtual-machine
1
qemu
1
kvm
1
k8s
1
firecracker
1
cri-o
1
cri
1
linux
1
trusted-applications
1
sgx-enclave
1
runtime
1
oci-runtime
1
enclave
1
container
1
confidential-container
1
cncf
1
cloud-native
1
cloud
1
microkernel
1
intel
1
alpha
1
wallet
1
ubuntu
1
trusted-computing
1