nsacyber / HIRS
Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber
☆187Updated this week
Alternatives and similar repositories for HIRS:
Users that are interested in HIRS are comparing it to the libraries listed below
- The Platform Attribute Certificate Creator can gather component details, create, sign, and validate the TCG-defined Platform Credential. …☆62Updated this week
- File Access Policy Daemon☆209Updated 2 weeks ago
- ⛔️ DEPRECATED☆37Updated 4 years ago
- TPM 2.0 Simulator Extraction Script☆48Updated 7 years ago
- A proposed hardware-based method for stopping known memory corruption exploitation techniques. #nsacyber☆155Updated 7 years ago
- Identifies unexpected and prohibited certificate authority certificates on Windows systems. #nsacyber☆112Updated 8 years ago
- Proof-of-concept implementation of the "Challenge/Response Remote Attestation" interaction model of the IETF RATS Reference Interaction M…☆31Updated last week
- Assesses CPU security of embedded devices. #nsacyber☆139Updated 8 years ago
- QEMU with vTPM support☆30Updated 5 months ago
- BootHole vulnerability (CVE-2020-10713). detection script, links and other mitigation related materials☆65Updated 4 years ago
- MSR Project Freta☆77Updated 8 months ago
- Simple and scalable Linux tools for verifying TPM-based remote attestations 🔬⚖️🔐⛓📏📜☆22Updated 3 years ago
- A CNCF Project to Bootstrap & Maintain Trust on the Edge / Cloud and IoT☆461Updated last week
- This is the upstream SELinux testsuite which is designed as a basic set of regression tests for the SELinux kernel functionality.☆54Updated this week
- The libtpms library provides software emulation of a Trusted Platform Module (TPM 1.2 and TPM 2.0)☆231Updated last week
- TPM Genie is an I2C bus interposer for discrete Trusted Platform Modules☆213Updated 4 years ago
- TPM2 Access Broker & Resource Management Daemon implementing the TCG spec.☆118Updated 4 months ago
- A software-defined security orchestration solution☆43Updated 3 years ago
- Learn how to use your Trusted Platform Module (TPM)☆132Updated 4 years ago
- Tutorials from TPM.dev members☆103Updated 9 months ago
- Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Stor…☆799Updated 3 months ago
- DEPRECATED TPM enabled GRUB2 Bootloader☆194Updated 3 years ago
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆64Updated 3 weeks ago
- Protection Profile for Operating Systems☆9Updated 3 weeks ago
- Reference implementation of the TCG Trusted Platform Module 2.0 specification.☆356Updated last month
- A Java library for parsing and programmatically using threat models☆79Updated 2 years ago
- GitHub mirror of the Linux Kernel's audit repository☆150Updated this week
- IPE is a Linux Security Module (LSM), which allows for a configurable policy to enforce integrity requirements on the whole system. IPE b…☆61Updated 2 months ago
- The OVAL Language Schemas☆87Updated 6 months ago
- This project is an implementation of the TCG TPM 2.0 specification. It is based on the TPM specification Parts 3 and 4 source code donate…☆28Updated 4 months ago