The Linux Foundation Projects
Skip to main content

Current Projects

A community focused on open source licensed projects securing data in use & accelerating the adoption of confidential computing through open collaboration.

Every member is welcome; every project meeting our criteria is welcome.

We are a transparent, collaborative community.

Certifier Framework For Confidential Computing

The Certifier Framework for Confidential Computing consists of a client API called the Certifier API and server-based policy evaluation server called the Certifier Service.

LEARN MORECONTACT US ON GITHUB

Enarx

Enarx provides a platform abstraction for Trusted Execution Environments (TEEs) enabling creating and running “private, fungible, serverless” applications.

LEARN MORECONTACT US ON GITHUB

Gramine

A particular use case for Gramine is Intel Software Guard Extensions (SGX), where applications do not work out-of-the-box. Gramine solves this problem, with the added security benefits. Gramine can serve as a compatibility layer on other platforms.

LEARN MORECONTACT US ON GITHUB

Islet

Islet is an open-source software project written in Rust that enables confidential computing on ARM architecture devices using the ARMv9 CCA. The primary objective of Islet is to enable on-device confidential computing and protect user privacy on end user devices.

LEARN MORECONTACT US ON GITHUB

Keystone

Keystone is an open-source project for building trusted execution environments (TEE) with secure hardware enclaves, based on the RISC-V architecture. Our goal is to build a secure and trustworthy open-source secure hardware enclave, accessible to everyone in industry and academia.

LEARN MORECONTACT US ON GITHUB

Occlum

Occlum makes running applications inside enclaves easy. It allows one to run unmodified programs inside enclaves with just a few simple commands. And Occlum is open-source and free to use.

LEARN MORECONTACT US ON GITHUB

Open Enclave SDK

Open Enclave SDK is an open source framework that allows developers to build Trusted Execution Environment (TEE) applications using a single enclaving abstraction.

LEARN MORECONTACT US ON GITHUB

spdm-rs

This project provides a Rust language implementation of SPDM, IDE_KM and TDISP. These protocols are used to facilitate direct device assignment for Trusted Execution Environment I/O (TEE-I/O) in Confidential Computing.

LEARN MORECONTACT US ON GITHUB

Veracruz

Veracruz is a research project exploring the design of privacy-preserving distributed systems. Veracruz uses strong isolation technology and remote attestation protocols to establish a “neutral ground” within which a collaborative, multi-party computation between a group of mistrusting principals takes place.

LEARN MORECONTACT US ON GITHUB

Veraison

Project Veraison builds software components that can be used to build an Attestation Verification Service.

LEARN MORECONTACT US ON GITHUB

VirTEE

VirTEE is an open community dedicated to developing open source tools for the bring-up, attestation, and management of Trusted Execution Environments.

LEARN MORECONTACT US ON GITHUB