nsacyber / HIRSLinks
Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber
☆205Updated this week
Alternatives and similar repositories for HIRS
Users that are interested in HIRS are comparing it to the libraries listed below
Sorting:
- The Platform Attribute Certificate Creator can gather component details, create, sign, and validate the TCG-defined Platform Credential. …☆70Updated last month
- ⛔️ DEPRECATED☆38Updated 4 years ago
- ☆11Updated 4 months ago
- File Access Policy Daemon☆231Updated this week
- Tutorials from TPM.dev members☆122Updated 5 months ago
- IPE is a Linux Security Module (LSM), which allows for a configurable policy to enforce integrity requirements on the whole system. IPE b…☆67Updated 2 months ago
- Identifies unexpected and prohibited certificate authority certificates on Windows systems. #nsacyber☆113Updated 9 years ago
- Simple and scalable Linux tools for verifying TPM-based remote attestations 🔬⚖️🔐⛓📏📜☆22Updated 4 years ago
- A set of tools to transfer data over a unidirectional network link (typically a network diode).☆57Updated 8 years ago
- TPM 2.0 Simulator Extraction Script☆51Updated 8 years ago
- GitHub mirror of the Linux Kernel's audit repository☆157Updated last week
- A software-defined security orchestration solution☆43Updated 4 years ago
- This project is an implementation of the TCG TPM 2.0 specification. It is based on the TPM specification Parts 3 and 4 source code donate…☆32Updated last month
- Proof-of-concept implementation of the "Challenge/Response Remote Attestation" interaction model of the IETF RATS Reference Interaction M…☆36Updated 10 months ago
- BootHole vulnerability (CVE-2020-10713). detection script, links and other mitigation related materials☆69Updated 5 years ago
- TPM-Fail Attack code & data☆124Updated 2 years ago
- ☆282Updated 2 years ago
- A CNCF Project to Bootstrap & Maintain Trust on the Edge / Cloud and IoT☆511Updated this week
- A proposed hardware-based method for stopping known memory corruption exploitation techniques. #nsacyber☆156Updated 8 years ago
- The libtpms library provides software emulation of a Trusted Platform Module (TPM 1.2 and TPM 2.0)☆262Updated 2 weeks ago
- A platform built for easy-to-use automated network traffic analysis☆60Updated 3 years ago
- The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber☆163Updated last year
- Stores Chromium Channel ID private keys in an Intel SGX enclave.☆33Updated 9 years ago
- Efficient TLS termination inside Intel SGX enclaves for existing applications☆109Updated 4 years ago
- ☆64Updated 3 weeks ago
- Industry Working Group on Automated Cryptographic Algorithm Validation☆194Updated 2 months ago
- Investigation Planner for long running analysis with unpredictable execution time. For example, dynamic analysis.☆16Updated 8 years ago
- DEPRECATED TPM enabled GRUB2 Bootloader☆196Updated 4 years ago
- Reference implementation of the TCG Trusted Platform Module 2.0 specification.☆385Updated 11 months ago
- A PKCS#11 interface for TPM2 hardware☆332Updated last month