Rich Authorization in Resource-Constrained Devices - TPM 2.0 Design and Use Cases
Offered By: Linux Foundation via YouTube
Course Description
Overview
Explore the intricacies of TPM 2.0 authorization policies in this 38-minute conference talk by Kenneth Goldman from IBM, presented at a Linux Foundation event. Delve into the design of a low-cost, resource-constrained device that offers a comprehensive set of authorizations despite limited RAM. Learn about the overall structure of TPM authorization policies, their calculation methods, and satisfaction criteria. Examine various policy statements and their practical applications through real-world use cases. Conclude with an in-depth analysis of a complex scenario that pushes the boundaries of the TPM's original design, showcasing the system's adaptability and potential for unforeseen applications.
Syllabus
Rich Authorization in a Resource Constrained Device - Kenneth Goldman, IBM
Taught by
Linux Foundation
Tags
Related Courses
CompTIA Security+ (SY0-601) Cert Prep: 7 Endpoint Security Design and ImplementationLinkedIn Learning SSCP Cert Prep: 7 Systems and Application Security
LinkedIn Learning The Internet of Insecure Things - 10 Most Wanted List
YouTube ICEFALL - Revisiting A Decade Of OT Insecure-By-Design Practices
Hack In The Box Security Conference via YouTube Low Level BootROM Protocol Fuzzing Secure Memory Regions
Hack In The Box Security Conference via YouTube