All Projects → ANSSI-FR → chipsec-check

ANSSI-FR / chipsec-check

Licence: BSD-2-Clause license
Tools to generate a Debian Linux distribution with chipsec to test hardware requirements

Programming Languages

shell
77523 projects

Projects that are alternatives of or similar to chipsec-check

safety-gear-detector-python
Observe workers as they pass in front of a camera to determine if they have adequate safety protection.
Stars: ✭ 54 (+31.71%)
Mutual labels:  intel
Intriman
Intriman is a documentation generator that retargets the Intel Intrinsics Guide to other documentation formats
Stars: ✭ 25 (-39.02%)
Mutual labels:  intel
sriov-cni
DPDK & SR-IOV CNI plugin
Stars: ✭ 209 (+409.76%)
Mutual labels:  intel
nrf-intel-hex
Yet another parser for "Intel HEX" files.
Stars: ✭ 21 (-48.78%)
Mutual labels:  intel
ddcpuid
🔬 dd's x86 CPU Identification tool
Stars: ✭ 21 (-48.78%)
Mutual labels:  intel
optimum
🏎️ Accelerate training and inference of 🤗 Transformers with easy to use hardware optimization tools
Stars: ✭ 567 (+1282.93%)
Mutual labels:  intel
KyogenRV
The Simple 5-staged pipeline RISC-V written in chisel3 for intel FPGA.
Stars: ✭ 37 (-9.76%)
Mutual labels:  intel
openvino pytorch layers
How to export PyTorch models with unsupported layers to ONNX and then to Intel OpenVINO
Stars: ✭ 17 (-58.54%)
Mutual labels:  intel
ASRock-Z390-Phantom-ITX-OpenCore-Hackintosh-Monterey
Asrock Z390 phantom gaming itx ac Hackintosh OpenCore EFI 华擎 Z390 幻影电竞 itx 黑苹果 OC EFI 🍎 🎮 Monterey
Stars: ✭ 25 (-39.02%)
Mutual labels:  intel
gpufetch
Simple yet fancy GPU architecture fetching tool
Stars: ✭ 66 (+60.98%)
Mutual labels:  intel
Autodesk-Fusion-360-for-Linux
This is a project, where I give you a way to use Autodesk Fusion 360 on Linux!
Stars: ✭ 810 (+1875.61%)
Mutual labels:  intel
Nvidia-Intel
Setup Nvidia & Intel services
Stars: ✭ 21 (-48.78%)
Mutual labels:  intel
darknet
Darknet on OpenCL Convolutional Neural Networks on OpenCL on Intel & NVidia & AMD & Mali GPUs for macOS & GNU/Linux
Stars: ✭ 160 (+290.24%)
Mutual labels:  intel
platform-intel mcs51
Intel MCS-51 (8051): development platform for PlatformIO
Stars: ✭ 40 (-2.44%)
Mutual labels:  intel
dpnp
NumPy drop-in replacement for Intel(R) XPUs
Stars: ✭ 42 (+2.44%)
Mutual labels:  intel
openncc
OpenNCC Kit
Stars: ✭ 23 (-43.9%)
Mutual labels:  intel
Hack-Z370-HD3P-i5-8400
My main Hackintosh running Monterey with a i5-8400 and a Gigabyte Z370-HD3P.
Stars: ✭ 56 (+36.59%)
Mutual labels:  intel
x86-Assembly-Reverse-Engineering
🛠 Knowledge about the topic of x86 assembly & disassembly 🛠
Stars: ✭ 27 (-34.15%)
Mutual labels:  intel
yask
YASK--Yet Another Stencil Kit: a domain-specific language and framework to create high-performance stencil code for implementing finite-difference methods and similar applications.
Stars: ✭ 81 (+97.56%)
Mutual labels:  intel
linux-intel-undervolt-tool
Scripts for undervolting 6+th gen Intel i* CPUs and their internal GPU.
Stars: ✭ 53 (+29.27%)
Mutual labels:  intel

Validation environnement for hardware security requirements

This repository contains tools and documentation for validation hardware configuration of an x86 platform, and especially its security.

The goal is to facilitate security requirements verification, for example when ordering PC platforms for the French administration.

The requirements themselves are published in a separate document (in French as well)

Provided tools can be used to build a bootable USB key. This key can boot in the following modes:

  • the first around the chipsec tool edited by Intel, integrated in a Debian live distribution, which can be used to check the platform configuration registers.
  • the second one is built around the keytool.efi binary which can be use to inspect and modify the SecureBoot key list. The key can be used to check that the platform will accept new, custom SecureBoot keys

Documentation on what is tested with those tools are detailed in the (doc/output) folder:

  • modules_chipsec.pdf explains the expected output from the chipsec tool
  • CPU Options.pdf details the security-related CPU options on Intel x86 platform
  • SPI Protection.pdf details protection of the SPI flash hosting the BIOS code
  • SRAM Protection.pdf details register configuration for correct protection of the memory mapping (especially for SMRAM protection against SMM attacks)

The documentation folder also provide guidance on how to build the USB keys.

ISO of pre-built USB keys are available in the releases section. Be aware that they are signed using a key generated by the developpers and should only be use for demonstration purposes. You are really advised to generate your own CA and keys if you intend to use them for real testing.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].