nsacyber / HIRSLinks
Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber
☆190Updated this week
Alternatives and similar repositories for HIRS
Users that are interested in HIRS are comparing it to the libraries listed below
Sorting:
- The Platform Attribute Certificate Creator can gather component details, create, sign, and validate the TCG-defined Platform Credential. …☆62Updated this week
- ⛔️ DEPRECATED☆37Updated 4 years ago
- A CNCF Project to Bootstrap & Maintain Trust on the Edge / Cloud and IoT☆471Updated last week
- TPM Genie is an I2C bus interposer for discrete Trusted Platform Modules☆213Updated 4 years ago
- Tutorials from TPM.dev members☆106Updated 11 months ago
- A proposed hardware-based method for stopping known memory corruption exploitation techniques. #nsacyber☆156Updated 8 years ago
- Identifies unexpected and prohibited certificate authority certificates on Windows systems. #nsacyber☆113Updated 9 years ago
- File Access Policy Daemon☆215Updated 2 weeks ago
- The libtpms library provides software emulation of a Trusted Platform Module (TPM 1.2 and TPM 2.0)☆237Updated last week
- Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Stor…☆810Updated 5 months ago
- Assesses CPU security of embedded devices. #nsacyber☆139Updated 9 years ago
- TPM 2.0 Simulator Extraction Script☆49Updated 7 years ago
- Proof-of-concept implementation of the "Challenge/Response Remote Attestation" interaction model of the IETF RATS Reference Interaction M…☆32Updated 2 months ago
- Reference implementation of the TCG Trusted Platform Module 2.0 specification.☆361Updated 3 months ago
- Intel® Software Guard Extensions SSL☆229Updated 5 months ago
- QEMU with vTPM support☆30Updated 7 months ago
- ☆10Updated 2 months ago
- Robust Internet of Things, Microsoft Research☆85Updated 2 years ago
- Python bindings for TSS☆70Updated 3 weeks ago
- TPM2 Access Broker & Resource Management Daemon implementing the TCG spec.☆119Updated 7 months ago
- Industry Working Group on Automated Cryptographic Algorithm Validation☆185Updated last week
- Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber☆55Updated 6 years ago
- wolfTPM is a highly portable TPM 2.0 library, designed for embedded use.☆275Updated this week
- DEPRECATED TPM enabled GRUB2 Bootloader☆194Updated 3 years ago
- A PKCS#11 interface for TPM2 hardware☆304Updated last month
- The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber☆159Updated last year
- The code to the SGX-ROP paper☆184Updated 5 years ago
- Learn how to use your Trusted Platform Module (TPM)☆137Updated 4 years ago
- This project is an implementation of the TCG TPM 2.0 specification. It is based on the TPM specification Parts 3 and 4 source code donate…☆31Updated 3 weeks ago
- GitHub mirror of the Linux Kernel's audit repository☆153Updated this week