Azure / Project-CerberusLinks
☆64Updated 3 weeks ago
Alternatives and similar repositories for Project-Cerberus
Users that are interested in Project-Cerberus are comparing it to the libraries listed below
Sorting:
- Security and Privacy Research at Microsoft☆46Updated last year
- Reference implementation of the TCG Trusted Platform Module 2.0 specification.☆385Updated 10 months ago
- Tutorials from TPM.dev members☆122Updated 4 months ago
- Robust Internet of Things, Microsoft Research☆91Updated 2 years ago
- Converged Security Suite for Intel & AMD platform security features☆71Updated 2 weeks ago
- wolfTPM is a highly portable TPM 2.0 library, designed for embedded use.☆305Updated last week
- The libtpms library provides software emulation of a Trusted Platform Module (TPM 1.2 and TPM 2.0)☆262Updated last week
- Hardware Root of Trust☆24Updated last year
- ☆55Updated last week
- An open source implementation of an AMD-V Secure Loader.☆27Updated 4 years ago
- A tool to help you understand TPM commands and responses.☆47Updated last year
- ☆113Updated 2 years ago
- Security Project☆104Updated this week
- A tool for parsing common ACPI tables☆15Updated 5 years ago
- Proof-of-concept for the GhostWrite CPU bug.☆118Updated last year
- Go Trusted Execution Environment (TEE)☆147Updated 5 months ago
- This project is an implementation of the TCG TPM 2.0 specification. It is based on the TPM specification Parts 3 and 4 source code donate…☆32Updated last month
- Proof-of-concept implementation of the "Challenge/Response Remote Attestation" interaction model of the IETF RATS Reference Interaction M…☆36Updated 10 months ago
- Secure Device Conneciton Protocol sample and documentation☆49Updated 2 years ago
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆115Updated 2 years ago
- Intel ATR Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives☆101Updated 8 years ago
- ☆17Updated 2 years ago
- Arbitrary Speculative Code Execution with Return Instructions☆176Updated 2 years ago
- Linux Security Hardening for Confidential Compute☆69Updated last year
- TCTI module for use with TSS2 libraries in UEFI environment☆38Updated last year
- Simple and scalable Linux tools for verifying TPM-based remote attestations 🔬⚖️🔐⛓📏📜☆22Updated 4 years ago
- CHERI ISA Specification☆26Updated 2 weeks ago
- TPM 2.0 Simulator Extraction Script☆51Updated 8 years ago
- SIde-Channel Analysis toolKit: embedded security evaluation tools☆30Updated 4 years ago
- Tools for analyzing UEFI firmware and checking UEFI modules with FwHunt rules☆242Updated 9 months ago