93 lines
4.3 KiB
Markdown
93 lines
4.3 KiB
Markdown
## trusted execution environments
|
|
|
|
<br>
|
|
|
|
<p align="center">
|
|
<img src="https://github.com/user-attachments/assets/9e72ad3d-2e3c-458b-aa2f-756dc59d3ab2" width="70%" align="center"/>
|
|
</p>
|
|
|
|
<br>
|
|
|
|
----
|
|
|
|
### cool resources
|
|
|
|
<br>
|
|
|
|
##### full autonomous agents
|
|
|
|
* **[setting your pet rock free, by teleport (2024)](https://medium.com/@tee_hee_he/setting-your-pet-rock-free-3e7895201f46)**
|
|
* **[the truth of ai agents, by phala (2024)](https://phala.network/posts/truth-of-AI-Agent)**
|
|
* **[physical unclonable functions for socially unpredictable humans, by sxysun (2024)](https://www.youtube.com/watch?v=aLqlpa8ZIOw)**
|
|
|
|
<br>
|
|
|
|
##### sgx stuff
|
|
|
|
* **[linux instalation guides](https://download.01.org/intel-sgx/latest/linux-latest/docs)**
|
|
* **[intel SGX explained, by costan et al.](https://eprint.iacr.org/2016/086.pdf)**
|
|
* **[secure computation in rust: using intel's SGX with teaclave && fortanix](https://blog.lambdaclass.com/secure-computation-in-rust-using-intels-sgx-instructions-with-teaclave-and-fortanix/)**
|
|
* **[2fa zk-rollups using sgx, by j. drake](https://ethresear.ch/t/2fa-zk-rollups-using-sgx/14462)**
|
|
* **[why multi-prover matters, sgx as a possible solution, by taiko labs](https://taiko.mirror.xyz/Kx1Mp4WJjd83K1KDEwp1pM7xi9QmpSahxJg3S_N7NE4)**
|
|
* **[autonomous tees manifest, by poeticte](https://poeticte.ch/posts/autonomous-TEEs-manifesto.html)**
|
|
* **[hardware-supported trusted execution environments, by m. schneider et al.](https://arxiv.org/pdf/2205.12742)**
|
|
|
|
<br>
|
|
|
|
##### cloud providers and framework
|
|
|
|
* **[nitro enclaves at aws](https://aws.amazon.com/ec2/nitro/nitro-enclaves/)**
|
|
* **[a few notes on aws nitro enclaves: attack surface, by p. platek](https://blog.trailofbits.com/2024/09/24/notes-on-aws-nitro-enclaves-attack-surface/)**
|
|
* **[keystone enclave (open framework for architecting tee)](https://keystone-enclave.org/)**
|
|
|
|
<br>
|
|
|
|
##### attestations
|
|
|
|
<br>
|
|
|
|
<p align="center">
|
|
<img src="https://github.com/user-attachments/assets/5763e0ff-095e-49cf-ae87-e3d08a5a38ee" width="70%" align="center"/>
|
|
</p>
|
|
|
|
<br>
|
|
|
|
* **[fortanix](https://edp.fortanix.com/docs/examples/attestation/)**
|
|
* **[automata](https://www.ata.network/)**
|
|
|
|
<br>
|
|
|
|
##### quantum settings
|
|
|
|
* **[is the security of quantum cryptography guaranteed by the laws of physics?, by bernstein](https://arxiv.org/pdf/1803.04520)**
|
|
* **[the laws of physics and cryptographic security; by rudolph](https://arxiv.org/pdf/quant-ph/0202143)**
|
|
* **[qtee, sarching for security through physics](https://github.com/sbellem/qtee)**
|
|
* **[introduction to quantum information, by bt3gl](https://www.astro.sunysb.edu/steinkirch/books/qi.pdf)**
|
|
|
|
<br>
|
|
|
|
##### offensive
|
|
|
|
* **[securing tee apps: a developer's guide, by prateek et al. (2025)](https://www.bedlamresear.ch/posts/securing-tee-apps/)**
|
|
* **[the 5 levels of secure hardware, by g. konstantopoulos (2024)](https://www.paradigm.xyz/2024/11/the-5-levels-of-secure-hardware)**
|
|
* **[openai's take on ai infrastructure threat model (2024)](https://openai.com/index/reimagining-secure-infrastructure-for-advanced-ai/)**
|
|
* **[using memory errors to attack a virtual machine, by govindavajhala et al.](https://www.cs.princeton.edu/~appel/papers/memerr.pdf)**
|
|
* **ztee, trustless suply chains, by q. kilbourn: [part I](https://writings.flashbots.net/ZTEE) and [part II](https://writings.flashbots.net/ZTEE2-Supply-Chains)**
|
|
|
|
<br>
|
|
|
|
##### on blockchains
|
|
|
|
* **[tees: a primer, by a. shidham (2025)](https://a16zcrypto.com/posts/article/trusted-execution-environments-tees-primer/)**
|
|
* **[the road towards an encrypted mempool on ethereum, by shutter (2025)](https://docs.shutter.network/docs/shutter/research/the_road_towards_an_encrypted_mempool_on_ethereum)**
|
|
* **[demystifying remote attestation by taking it on-chain, by flashbots](https://collective.flashbots.net/t/demystifying-remote-attestation-by-taking-it-on-chain/2629)**
|
|
* **[spacecoin, by d. bar et al. (leveraging satellite infra for tee-like functionality)](https://github.com/spacecoinxyz/research/blob/main/publications/Blue-Paper-Spacecoinxyz.pdf)**
|
|
* **[multi-prover implementation on scroll (leveraging tees)](https://scroll.io/blog/scaling-security)**
|
|
|
|
<br>
|
|
|
|
##### code
|
|
|
|
* **[liquefaction](https://github.com/key-encumbrance/liquefaction)**
|
|
* smart contract key-encumbered wallet platform (i.e., key is not known by user or or admin, but generated by the application running in a tee)
|