Protecting System Integrity with Trusted Platform Module
Offered By: USENIX via YouTube
Course Description
Overview
Explore the critical importance of safeguarding system integrity through Trusted Platform Module (TPM) in this 27-minute conference talk from USENIX LISA21. Delve into the potential vulnerabilities in lower layers of the software and firmware stack, focusing on the impact of persistent implants in system firmware, particularly UEFI. Witness the development and injection of a "hello-world" system firmware malware, and learn how TPM, a secure cryptoprocessor, can protect against such threats. Discover the role of TPM in granting access to system secrets only when the integrity of all stack layers is verified, enhancing overall platform security.
Syllabus
LISA21 - Protecting System Integrity with Trusted Platform Module
Taught by
USENIX
Related Courses
TPM-FAIL - TPM Meetings Timing and Lattice AttacksTheIACR via YouTube Look at ME! - Intel ME Investigation
media.ccc.de via YouTube Hacking With a TPM
media.ccc.de via YouTube What Is Needed to Build Trusted Infrastructures
Red Hat via YouTube Keylime - An Open Source TPM Project for Remote Trust
Linux Foundation via YouTube