microsoft / RIoTLinks
Robust Internet of Things, Microsoft Research
☆91Updated 2 years ago
Alternatives and similar repositories for RIoT
Users that are interested in RIoT are comparing it to the libraries listed below
Sorting:
- Security and Privacy Research at Microsoft☆46Updated last year
- Reference implementation of the TCG Trusted Platform Module 2.0 specification.☆383Updated 10 months ago
- Formally-verified reference monitor for a secure isolated execution ("enclave") environment on ARM TrustZone☆110Updated 3 years ago
- wolfTPM is a highly portable TPM 2.0 library, designed for embedded use.☆304Updated last month
- The Intel(R) Enhanced Privacy ID Software Development Kit☆30Updated 3 years ago
- Simple and scalable Linux tools for verifying TPM-based remote attestations 🔬⚖️🔐⛓📏📜☆22Updated 4 years ago
- ☆64Updated this week
- TPM 2.0 Simulator Extraction Script☆51Updated 8 years ago
- Industry Working Group on Automated Cryptographic Algorithm Validation☆191Updated last month
- Tests for verifying implementations of TBSA-v8M and the PSA Certified APIs☆73Updated last week
- Tutorials from TPM.dev members☆118Updated 4 months ago
- The famous tpm-emulator by Mario Strasser, previously hosted on BerliOs. It supports TPM1.2 only!☆183Updated 4 years ago
- TPM C library for use with Azure IoT SDKs☆14Updated 11 months ago
- ☆21Updated last year
- ⛔️ DEPRECATED☆38Updated 4 years ago
- Intel® Software Guard Extensions SSL☆239Updated last month
- Minimal RISC Extensions for Isolated Execution☆54Updated 6 years ago
- This repo is used for managing conversations about Veraison features☆53Updated 2 years ago
- A microarchitectural leakage detection framework using dynamic instrumentation.☆80Updated 2 months ago
- The libtpms library provides software emulation of a Trusted Platform Module (TPM 1.2 and TPM 2.0)☆262Updated last week
- Proof-of-concept implementation of the "Challenge/Response Remote Attestation" interaction model of the IETF RATS Reference Interaction M…☆34Updated 9 months ago
- AMD Secure Encrypted Virtualization☆356Updated 3 weeks ago
- ☆73Updated 2 years ago
- Secure Device Conneciton Protocol sample and documentation☆49Updated 2 years ago
- ☆185Updated 4 years ago
- CoRIM and CoMID manipulation library☆21Updated 3 weeks ago
- ☆78Updated 3 years ago
- Learn how to use your Trusted Platform Module (TPM)☆140Updated 5 years ago
- TPM2 Access Broker & Resource Management Daemon implementing the TCG spec.☆123Updated 2 months ago
- Efficient TLS termination inside Intel SGX enclaves for existing applications☆109Updated 3 years ago