Skip to content
#

secure-boot

Here are 97 public repositories matching this topic...

Hardware-based attestation / intrusion detection app for Android devices. It provides both local verification with another Android device via QR codes and optional scheduled server-based verification with support for alert emails. It uses hardware-backed keys and attestation support as the foundation and chains trust to the app for software checks.

  • Updated Apr 26, 2024
  • Java

attestation.app remote attestation server. Server code for use with the Auditor app: https://github.com/GrapheneOS/Auditor. It provides two services: submission of attestation data samples and a remote attestation implementation with email alerts to go along with the local implementation based on QR code scanning in the app.

  • Updated Apr 25, 2024
  • Java

MultiZone® Security TEE is the quick and safe way to add security and separation to any RISC-V processors. The RISC-V standard ISA doesn't define TrustZone-like primitives to provide hardware separation. To shield critical functionality from untrusted third-party components, MultiZone provides hardware-enforced, software-defined separation of multi

  • Updated Jan 24, 2024
  • C

Improve this page

Add a description, image, and links to the secure-boot topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the secure-boot topic, visit your repo's landing page and select "manage topics."

Learn more