VirTEE is an Open Community dedicated to building FLOSS components to enable the construction of Virtualization-based TEEs (Trusted Execution Environments) using technologies such as AMD SEV-SNP, Intel TDX and Armv9 Realms.
Communication channels
- Chat: #virtee on Matrix
Current projects
-
kbs-types: Rust (de)serializable types for KBS
-
reference-kbs: A reference implementation of the KBS attestation protocol
-
roadmap: The official VirTEE planning and feature roadmap.
-
sev: Rust library exposing APIs for the AMD SEV-SNP platform
-
sev-snp-measure: A tool and library for calculating an AMD SEV-SNP expected virtual machine measurements.
-
sev-snp-measure-go: A direct port of sev-snp-mesure for Go-lang integration.
-
snpguest: A utility for managing AMD SEV-SNP enabled virtual machines.
-
snphost: A utility for AMD SEV-SNP enabled platforms administration.
-
tdx: Rust library exposing APIs for Intel Trusted Domain eXtensions (TDX).
Do you have a project that you would see listed here? Propose a change to this page!
Other resources
FAQ
What is a TEE?
According to the CCC (Confidential Computing Consortium), a TEE is as an environment that provides a level of assurance of the following three properties:
- Data confidentiality: Unauthorized entities cannot view data while it is in use within the TEE.
- Data integrity: Unauthorized entities cannot add, remove, or alter data while it is in use within the TEE.
- Code integrity: Unauthorized entities cannot add, remove, or alter code executing in the TEE.
For more information, check this whitepaper published by the CCC.
What is a Virtualization-based TEE?
It’s a TEE that’s constructed using Hardware-assisted Virtualization, combined with other technologies (AMD SEV-SNP, Intel TDX, or Armv9 Realms) which enable the guest owner to verify the integrity and confidentiality of the Virtual Machine.
VirTEE is a member project of the Confidential Computing Consortium (CCC)