TrustedComputingGroup / DICE
Device Identifier Composition Engine
☆11Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for DICE
- Formal specification of attestation mechanisms in Confidential Computing☆14Updated 2 months ago
- Miscellaneous materials related to the "attested TLS" proof-of-concept☆16Updated last year
- Go Trusted Execution Environment (TEE)☆112Updated 3 weeks ago
- Tutorials from TPM.dev members☆94Updated 4 months ago
- Proof-of-concept implementation of the "Challenge/Response Remote Attestation" interaction model of the IETF RATS Reference Interaction M…☆27Updated 3 weeks ago
- Simple and scalable Linux tools for verifying TPM-based remote attestations 🔬⚖️🔐⛓📏📜☆21Updated 3 years ago
- Setup and operation guide for OPTIGA™ TPM backed remote attestation on a Linux system☆19Updated this week
- AMD SEV Tool☆81Updated last year
- RATS Architecture☆17Updated 2 months ago
- TCTI module for use with TSS2 libraries in UEFI environment☆32Updated last week
- OpenSSL Provider for TPM2 integration☆88Updated last month
- ☆57Updated 2 months ago
- ⛔️ DEPRECATED☆37Updated 3 years ago
- go-sev-guest offers a library to wrap the /dev/sev-guest device in Linux, as well as a library for attestation verification of fundamenta…☆52Updated this week
- Python bindings for TSS☆65Updated last month
- Converged Security Suite for Intel & AMD platform security features☆59Updated 3 months ago
- Efficient TLS termination inside Intel SGX enclaves for existing applications☆106Updated 2 years ago
- Design documents and interoperability tests for Interoperable RA-TLS projects☆11Updated 10 months ago
- This repo is used for managing conversations about Veraison features☆52Updated 10 months ago
- ☆78Updated last year
- Securing storage encryption by using Intel SGX enclaves. First attempt for the isolation of OS components with trusted enclaves.☆81Updated 7 years ago
- A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes☆46Updated last year
- Meeting materials☆15Updated 2 weeks ago
- wolfSSL Intrusion Detection and Prevention System (IDPS)☆33Updated last month
- Framework for building transparent memory encryption and authentication solutions☆25Updated 6 years ago
- Generate and verify JWT tokens with Trusted Platform Module (TPM)☆11Updated last month
- TPM 2.0 Simulator Extraction Script☆47Updated 7 years ago
- Docker image for TPM 2.0 development from TPM.dev☆11Updated last year
- Calculate AMD SEV/SEV-ES/SEV-SNP measurement for confidential computing☆55Updated 5 months ago