Azure / Project-CerberusLinks
☆60Updated last week
Alternatives and similar repositories for Project-Cerberus
Users that are interested in Project-Cerberus are comparing it to the libraries listed below
Sorting:
- Security and Privacy Research at Microsoft☆44Updated 10 months ago
- Reference implementation of the TCG Trusted Platform Module 2.0 specification.☆366Updated 4 months ago
- Tutorials from TPM.dev members☆109Updated last year
- Robust Internet of Things, Microsoft Research☆87Updated 2 years ago
- The libtpms library provides software emulation of a Trusted Platform Module (TPM 1.2 and TPM 2.0)☆240Updated this week
- Hardware Root of Trust☆24Updated 8 months ago
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆110Updated 2 years ago
- wolfTPM is a highly portable TPM 2.0 library, designed for embedded use.☆287Updated this week
- Secure Device Conneciton Protocol sample and documentation☆48Updated 2 years ago
- Converged Security Suite for Intel & AMD platform security features☆64Updated last week
- Linux Security Hardening for Confidential Compute☆67Updated 10 months ago
- An open source implementation of an AMD-V Secure Loader.☆26Updated 3 years ago
- ☆112Updated 2 years ago
- BootHole vulnerability (CVE-2020-10713). detection script, links and other mitigation related materials☆67Updated 4 years ago
- A tool for parsing common ACPI tables☆14Updated 5 years ago
- ☆49Updated 3 weeks ago
- TPM 2.0 Simulator Extraction Script☆49Updated 7 years ago
- ☆142Updated this week
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆237Updated last year
- This project is an implementation of the TCG TPM 2.0 specification. It is based on the TPM specification Parts 3 and 4 source code donate…☆31Updated 2 months ago
- ☆17Updated 2 years ago
- ☆32Updated 8 years ago
- Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber☆193Updated this week
- Security Project☆91Updated this week
- TCTI module for use with TSS2 libraries in UEFI environment☆36Updated 8 months ago
- Source code & scripts for experimental characterization and real-system demonstration of RowPress, a widespread read disturbance phenomen…☆33Updated last year
- Intel ATR Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives☆97Updated 8 years ago
- Tools for analyzing UEFI firmware and checking UEFI modules with FwHunt rules☆233Updated 3 months ago
- TPM-Fail Attack code & data☆122Updated 2 years ago
- ☆13Updated 2 weeks ago