https://github.com/dineshpinto/awesome-tee-blockchain

A curated list of resources for learning about Trusted Execution Environments (TEEs) in the context of blockchains.

https://github.com/dineshpinto/awesome-tee-blockchain

Science Score: 36.0%

This score indicates how likely this project is to be science-related based on various indicators:

  • CITATION.cff file
  • codemeta.json file
    Found codemeta.json file
  • .zenodo.json file
    Found .zenodo.json file
  • DOI references
  • Academic publication links
    Links to: arxiv.org, ieee.org
  • Academic email domains
  • Institutional organization owner
  • JOSS paper metadata
  • Scientific vocabulary similarity
    Low similarity (6.3%) to scientific vocabulary

Keywords

awesome awesome-list blockchain confidential-computing intel-sgx intel-tdx nvidia-gpu trusted-execution-environment
Last synced: 4 months ago · JSON representation

Repository

A curated list of resources for learning about Trusted Execution Environments (TEEs) in the context of blockchains.

Basic Info
  • Host: GitHub
  • Owner: dineshpinto
  • License: cc0-1.0
  • Default Branch: main
  • Homepage:
  • Size: 85 KB
Statistics
  • Stars: 32
  • Watchers: 2
  • Forks: 4
  • Open Issues: 1
  • Releases: 0
Topics
awesome awesome-list blockchain confidential-computing intel-sgx intel-tdx nvidia-gpu trusted-execution-environment
Created over 1 year ago · Last pushed 5 months ago
Metadata Files
Readme Contributing License

README.md

Awesome TEE Blockchain Awesome

Check Links

A curated list of resources for learning about Trusted Execution Environments (TEEs) and their applications in the blockchain space.

Contributions are welcome! See CONTRIBUTING.md.

Getting Started

Articles, talks and presentations to help you get started with TEEs.

Articles

Research Papers

Key research works covering different aspects of TEEs.

Hardware Platforms

The underlying silicon providing TEE capabilities.

Cloud Solutions

Major cloud providers offering virtual machines or services utilizing TEE hardware.

Blockchain Applications & Use Cases

Examples of how TEEs are being used or proposed within the blockchain ecosystem.

Code Repositories

Software related to TEEs in the context of blockchain, libraries, and example implementations.

Rust

Go

  • google/go-tpm-tools - Go packages built on go-tpm providing a high-level API for using TPMs.
  • google/go-sev-guest - Library to wrap the /dev/sev-guest device in Linux, as well as a library for attestation verification of fundamental components of an attestation report.
  • google/go-tdx-guest - Library to wrap the /dev/tdx-guest device in Linux, as well as a library for attestation verification of fundamental components of an attestation quote.
  • matter-labs/vault-auth-tee - Hashicorp Vault plugin for authenticating Trusted Execution Environments (TEE) like SGX enclaves.
  • usbarmory/GoTEE - Go Trusted Execution Environment (TEE).
  • iotexproject/w3bstream - An offchain computing layer for DePIN verifiable data computation, supporting a variety of validity proofs including Zero Knowledge (ZK), Trusted Execution Environments (TEE), and Multi-party Computation (MPC).
  • oasisprotocol/oasis-core - Performant and Confidentiality-Preserving Smart Contracts + Blockchains.
  • hyperledger/fabric-private-chaincode - FPC enables Confidential Chaincode Execution for Hyperledger Fabric using Intel SGX.
  • Microsoft/confidential-container-demos - Demos for running containers in confidential environments on Azure.

CPP

  • intel/linux-sgx - Intel SGX SDK and Platform Software (PSW) for Linux.
  • NixOS/nix - Nix, the purely functional package manager.
  • microsoft/azure-tee-attestation-samples - Trusted Execution Environment examples leveraging attestations on Azure.
  • lsds/Teechain - Teechain: A Secure Payment Network with Asynchronous Blockchain Access.
  • skalenetwork/sgxwallet - Opensource high-performance hardware secure crypto wallet that is based on Intel SGX technology. First opensource product on Intel SGX whitelist. Scales to 100,000+ transactions per second. Currently supports ETH and SKALE, and will support BTC in the future. Sgxwallet is under heavy development and use by SKALE network.
  • hyperledger-labs/private-data-objects - The Private Data Objects lab provides technology for confidentiality-preserving, off-chain smart contracts.

C

Others

Major TEE Attacks

Documented attacks or attack vectors on TEEs. List is WIP.

Classes: TE – transient/speculative; MDS – microarchitectural data sampling; FI – fault injection; AL – architectural leakage; PR – protocol/design.

| Year | Name | Class | Affected TEEs | CVE(s) | Summary | Key Mitigations | | ---- | ------------------------------------------ | ----------------- | --------------------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ----------------------------------------------------------------------------- | --------------------------------------------------------------------------------------- | | 2018 | Foreshadow / L1TF | TE | Intel SGX, VMs, OS kernels | CVE‑2018‑3615, CVE‑2018‑3620, CVE‑2018‑3646 | Read enclave/VM/kernel secrets via L1D leaks | Microcode updates, L1D flush on enclave transitions, OS patches, SGX TCB recovery | | 2018 | SEVered | PR / VM isolation | AMD SEV (pre‑SNP) | 1812.01129 | Malicious hypervisor remaps guest pages to exfiltrate plaintext | Move to SEV‑SNP (integrity protection), stronger guest validation | | 2019 | MDS family (RIDL, Fallout, ZombieLoad) | MDS / TE | Intel SGX, VMs | CVE‑2018‑12126, CVE‑2018‑12127, CVE‑2018‑12130, CVE‑2019‑11091 | Leakage from CPU buffers into enclaves/VMs | Microcode buffer clearing, stronger serialization, sometimes disable HT | | 2019 | Plundervolt | FI | Intel SGX | CVE‑2019‑11157 | Software‑controlled undervolting corrupts enclave computation & leaks secrets | Lock MSR undervolt interface (uCode), disable voltage control, protocol‑level FI checks | | 2019 | TSX Asynchronous Abort (TAA) | TE / MDS | Intel SGX, VMs | CVE‑2019‑11135 | Additional transient leaks tied to TSX | Microcode, disable TSX, serialize on transitions | | 2019 | SGX-Step | SC / Tooling | Intel SGX | 1611.06952 | Fine‑grained interrupting boosts side‑channel resolution | Rate‑limit interrupts, constant‑time/data‑oblivious coding | | 2020 | Load Value Injection (LVI) | TE | Intel SGX | CVE‑2020‑0551 | Inject values into victim’s transient path | Compiler‑inserted LFENCEs/serialization; Intel LVI toolchain | | 2020 | CacheOut | MDS / TE | Intel SGX | CVE‑2020‑0549 | Extract data from L1D despite prior mitigations | Stronger L1D flush/serialization; enclave transition hardening | | 2020 | CrossTalk | MDS | Intel SGX | CVE‑2020‑0543 | Cross‑core leakage via shared buffers | Microcode fixes; synchronization/isolation | | 2022 | ÆPIC Leak | AL | Intel SGX | CVE‑2022‑21233 | Architectural leak of stale data via APIC MMIO (no speculation) | Microcode/firmware updates, sanitize APIC reads, kernel patches | | 2023 | Downfall / Gather Data Sampling (GDS) | TE | Intel SGX, VMs | CVE‑2022‑40982 | GATHER instruction leaks vector register data | Microcode; serialization barriers; toolchain guidance | | 2023 | Inception / Phantom Speculation (AMD) | TE | AMD SEV/SNP (indirectly affects CC VMs) | CVE‑2023‑20569 | Speculation attack on Zen CPUs | Microcode/firmware updates; speculation barriers |

Social Media & Community

TEEs on social media.

Additional Resources

Owner

  • Name: Dinesh Pinto
  • Login: dineshpinto
  • Kind: user
  • Location: Switzerland/Germany

quantum info PhD student @ EPFL, pythonista & rustacean

GitHub Events

Total
  • Watch event: 24
  • Issue comment event: 1
  • Push event: 18
  • Fork event: 2
Last Year
  • Watch event: 24
  • Issue comment event: 1
  • Push event: 18
  • Fork event: 2