YoVDO

Rich Authorization in Resource-Constrained Devices - TPM 2.0 Design and Use Cases

Offered By: Linux Foundation via YouTube

Tags

Embedded Systems Security Courses Cryptography Courses Hardware Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of TPM 2.0 authorization policies in this 38-minute conference talk by Kenneth Goldman from IBM, presented at a Linux Foundation event. Delve into the design of a low-cost, resource-constrained device that offers a comprehensive set of authorizations despite limited RAM. Learn about the overall structure of TPM authorization policies, their calculation methods, and satisfaction criteria. Examine various policy statements and their practical applications through real-world use cases. Conclude with an in-depth analysis of a complex scenario that pushes the boundaries of the TPM's original design, showcasing the system's adaptability and potential for unforeseen applications.

Syllabus

Rich Authorization in a Resource Constrained Device - Kenneth Goldman, IBM


Taught by

Linux Foundation

Tags

Related Courses

CompTIA Security+ (SY0-601) Cert Prep: 7 Endpoint Security Design and Implementation
LinkedIn Learning
SSCP Cert Prep: 7 Systems and Application Security
LinkedIn Learning
The Internet of Insecure Things - 10 Most Wanted List
YouTube
ICEFALL - Revisiting A Decade Of OT Insecure-By-Design Practices
Hack In The Box Security Conference via YouTube
Low Level BootROM Protocol Fuzzing Secure Memory Regions
Hack In The Box Security Conference via YouTube