YoVDO

A Canonical Event Log Structure for IMA - Optimizing Attestation Information

Offered By: Linux Foundation via YouTube

Tags

Linux Security Courses Cryptography Courses Embedded Systems Courses Industrial Control Systems Courses Firmware Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a presentation on the development of a Canonical Event Log structure for the Integrity Measurement Architecture (IMA) in Linux systems. Learn about the efforts to improve attestation information conveyance to verifiers, including cryptographic algorithm agility and sequence numbering. Discover how this new format optimizes storage and transmission through Event Log list truncation and de-duplication, while supporting existing IMA templates and firmware Event Logs. Gain insights into the prototype demonstration and its integration with an open source verifier. Delve into topics such as industrial control system security, hardware-rooted measurement, appraisal, and attestation for industrial embedded controllers. Examine the presentation's structure, covering introduction, attestation issues, TCG architecture, content types, workflow, proposal details, proof of concept, and implementation aspects.

Syllabus

Introduction
Issues in attestation
Record Number
TCG Architecture
ContentType
CEO Management
Workflow
Proposal
Exporting
Refactoring
Proof of Concept
Adding Fields
Running
Summary
Time stamps


Taught by

Linux Foundation

Tags

Related Courses

I Boot when U-Boot
nullcon via YouTube
The Internet of Insecure Things - 10 Most Wanted List
YouTube
Attacking IOBluetoothFamily HCI and Vendor-Specific Commands
Black Hat via YouTube
Breaking Through Another Side - Bypassing Firmware Security Boundaries from Embedded Controller
Black Hat via YouTube
Securing Your In-Ear Fitness Coach - Challenges in Hardening Next Generation Wearables
Black Hat via YouTube