Remote Timing Attacks on TPMs - AKA TPM-Fail
Offered By: Black Hat via YouTube
Course Description
Overview
Explore a critical security vulnerability in Trusted Platform Modules (TPMs) through this 39-minute Black Hat conference talk. Delve into the world of hardware-based root of trust and learn how TPMs protect cryptographic keys from privileged systems and physical adversaries. Discover the speaker's findings on black-box timing analysis of TPM 2.0 devices in commodity computers, revealing secret-dependent execution times. Gain insights into potential remote timing attacks on these essential security components found in smartphones, industrial systems, and various computing platforms. Presented by Daniel Moghimi, this talk sheds light on the implications of TPM-Fail and its impact on hardware-based security measures.
Syllabus
Remote Timing Attacks on TPMs, AKA TPM-Fail
Taught by
Black Hat
Related Courses
Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security ChipBlack Hat via YouTube Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube