nsacyber / HIRSLinks
Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber
☆193Updated last week
Alternatives and similar repositories for HIRS
Users that are interested in HIRS are comparing it to the libraries listed below
Sorting:
- The Platform Attribute Certificate Creator can gather component details, create, sign, and validate the TCG-defined Platform Credential. …☆64Updated last month
- ⛔️ DEPRECATED☆37Updated 4 years ago
- ☆10Updated 3 months ago
- Security and Privacy Research at Microsoft☆44Updated 10 months ago
- Tutorials from TPM.dev members☆109Updated last year
- File Access Policy Daemon☆221Updated this week
- Identifies unexpected and prohibited certificate authority certificates on Windows systems. #nsacyber☆114Updated 9 years ago
- A CNCF Project to Bootstrap & Maintain Trust on the Edge / Cloud and IoT☆476Updated this week
- The libtpms library provides software emulation of a Trusted Platform Module (TPM 1.2 and TPM 2.0)☆240Updated last week
- TPM Genie is an I2C bus interposer for discrete Trusted Platform Modules☆215Updated 4 years ago
- IPE is a Linux Security Module (LSM), which allows for a configurable policy to enforce integrity requirements on the whole system. IPE b…☆65Updated 3 months ago
- Simple and scalable Linux tools for verifying TPM-based remote attestations 🔬⚖️🔐⛓📏📜☆22Updated 4 years ago
- A proposed hardware-based method for stopping known memory corruption exploitation techniques. #nsacyber☆156Updated 8 years ago
- Learn how to use your Trusted Platform Module (TPM)☆136Updated 5 years ago
- TPM 2.0 Simulator Extraction Script☆49Updated 7 years ago
- Reference implementation of the TCG Trusted Platform Module 2.0 specification.☆365Updated 4 months ago
- The OpenDXL Ontology project is focused on the development of an open and interoperable cybersecurity messaging format for use with the O…☆76Updated 4 years ago
- BootHole vulnerability (CVE-2020-10713). detection script, links and other mitigation related materials☆67Updated 4 years ago
- Tools for security content automation, baseline tailoring, and overlay development.☆44Updated 11 months ago
- Assesses CPU security of embedded devices. #nsacyber☆139Updated 9 years ago
- Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Stor…☆823Updated 7 months ago
- The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber☆161Updated last year
- The SIMON and SPECK families of lightweight block ciphers. #nsacyber☆166Updated 5 years ago
- Industry Working Group on Automated Cryptographic Algorithm Validation☆189Updated 2 weeks ago
- Stores Chromium Channel ID private keys in an Intel SGX enclave.☆33Updated 9 years ago
- A software-defined security orchestration solution☆43Updated 3 years ago
- DEPRECATED TPM enabled GRUB2 Bootloader☆195Updated 3 years ago
- ☆60Updated this week
- Robust Internet of Things, Microsoft Research☆87Updated 2 years ago
- Setup and operation guide for OPTIGA™ TPM backed remote attestation on a Linux system☆22Updated 4 months ago