YoVDO

Protecting System Integrity with Trusted Platform Module

Offered By: USENIX via YouTube

Tags

LISA (Large Installation System Administration) Conference Courses Cybersecurity Courses System Security Courses Trusted Platform Module Courses

Course Description

Overview

Explore the critical importance of safeguarding system integrity through Trusted Platform Module (TPM) in this 27-minute conference talk from USENIX LISA21. Delve into the potential vulnerabilities in lower layers of the software and firmware stack, focusing on the impact of persistent implants in system firmware, particularly UEFI. Witness the development and injection of a "hello-world" system firmware malware, and learn how TPM, a secure cryptoprocessor, can protect against such threats. Discover the role of TPM in granting access to system secrets only when the integrity of all stack layers is verified, enhancing overall platform security.

Syllabus

LISA21 - Protecting System Integrity with Trusted Platform Module


Taught by

USENIX

Related Courses

TPM-FAIL - TPM Meetings Timing and Lattice Attacks
TheIACR via YouTube
Look at ME! - Intel ME Investigation
media.ccc.de via YouTube
Hacking With a TPM
media.ccc.de via YouTube
What Is Needed to Build Trusted Infrastructures
Red Hat via YouTube
Keylime - An Open Source TPM Project for Remote Trust
Linux Foundation via YouTube