YoVDO

Remote Timing Attacks on TPMs - AKA TPM-Fail

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Cryptography Courses Hardware Security Courses Vulnerability Analysis Courses Trusted Platform Module Courses

Course Description

Overview

Explore a critical security vulnerability in Trusted Platform Modules (TPMs) through this 39-minute Black Hat conference talk. Delve into the world of hardware-based root of trust and learn how TPMs protect cryptographic keys from privileged systems and physical adversaries. Discover the speaker's findings on black-box timing analysis of TPM 2.0 devices in commodity computers, revealing secret-dependent execution times. Gain insights into potential remote timing attacks on these essential security components found in smartphones, industrial systems, and various computing platforms. Presented by Daniel Moghimi, this talk sheds light on the implications of TPM-Fail and its impact on hardware-based security measures.

Syllabus

Remote Timing Attacks on TPMs, AKA TPM-Fail


Taught by

Black Hat

Related Courses

TPM-FAIL - TPM Meetings Timing and Lattice Attacks
TheIACR via YouTube
Look at ME! - Intel ME Investigation
media.ccc.de via YouTube
Hacking With a TPM
media.ccc.de via YouTube
What Is Needed to Build Trusted Infrastructures
Red Hat via YouTube
Keylime - An Open Source TPM Project for Remote Trust
Linux Foundation via YouTube