nsacyber / HIRSLinks
Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber
☆199Updated this week
Alternatives and similar repositories for HIRS
Users that are interested in HIRS are comparing it to the libraries listed below
Sorting:
- The Platform Attribute Certificate Creator can gather component details, create, sign, and validate the TCG-defined Platform Credential. …☆70Updated last month
- ⛔️ DEPRECATED☆37Updated 4 years ago
- ☆11Updated 2 weeks ago
- Tutorials from TPM.dev members☆113Updated 3 weeks ago
- Simple and scalable Linux tools for verifying TPM-based remote attestations 🔬⚖️🔐⛓📏📜☆22Updated 4 years ago
- File Access Policy Daemon☆226Updated this week
- Identifies unexpected and prohibited certificate authority certificates on Windows systems. #nsacyber☆113Updated 9 years ago
- A CNCF Project to Bootstrap & Maintain Trust on the Edge / Cloud and IoT☆485Updated this week
- Proof-of-concept implementation of the "Challenge/Response Remote Attestation" interaction model of the IETF RATS Reference Interaction M…☆32Updated 6 months ago
- BootHole vulnerability (CVE-2020-10713). detection script, links and other mitigation related materials☆67Updated 5 years ago
- Industry Working Group on Automated Cryptographic Algorithm Validation☆189Updated last month
- TPM 2.0 Simulator Extraction Script☆49Updated 7 years ago
- Tools for security content automation, baseline tailoring, and overlay development.☆44Updated last year
- A set of tools to transfer data over a unidirectional network link (typically a network diode).☆54Updated 8 years ago
- Libraries to abstract aspects of working with TPMs for the purposes of attestation☆399Updated this week
- A software-defined security orchestration solution☆43Updated 4 years ago
- A tool for characterizing the network behavior of IoT Devices. The primary intended use is to assist in the generation of allowlist files…☆24Updated 2 months ago
- 2017 - 2018 Certificate Policy development and drafting for Federal Public Trust Device PKI.☆43Updated last year
- Learn how to use your Trusted Platform Module (TPM)☆137Updated 5 years ago
- TPM Genie is an I2C bus interposer for discrete Trusted Platform Modules☆217Updated 4 years ago
- A framework for verifying PKI structures☆116Updated last month
- IPE is a Linux Security Module (LSM), which allows for a configurable policy to enforce integrity requirements on the whole system. IPE b…☆65Updated 5 months ago
- MSR Project Freta☆77Updated last year
- Security and Privacy Research at Microsoft☆44Updated last year
- ☆60Updated last week
- The libtpms library provides software emulation of a Trusted Platform Module (TPM 1.2 and TPM 2.0)☆242Updated this week
- The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber☆163Updated last year
- Stores Chromium Channel ID private keys in an Intel SGX enclave.☆33Updated 9 years ago
- This project is an implementation of the TCG TPM 2.0 specification. It is based on the TPM specification Parts 3 and 4 source code donate…☆31Updated 4 months ago
- The SIMON and SPECK families of lightweight block ciphers. #nsacyber☆165Updated 5 years ago