Remote Timing Attacks on TPMs - AKA TPM-Fail
Offered By: Black Hat via YouTube
Course Description
Overview
Explore a critical security vulnerability in Trusted Platform Modules (TPMs) through this 39-minute Black Hat conference talk. Delve into the world of hardware-based root of trust and learn how TPMs protect cryptographic keys from privileged systems and physical adversaries. Discover the speaker's findings on black-box timing analysis of TPM 2.0 devices in commodity computers, revealing secret-dependent execution times. Gain insights into potential remote timing attacks on these essential security components found in smartphones, industrial systems, and various computing platforms. Presented by Daniel Moghimi, this talk sheds light on the implications of TPM-Fail and its impact on hardware-based security measures.
Syllabus
Remote Timing Attacks on TPMs, AKA TPM-Fail
Taught by
Black Hat
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network