YoVDO

Securing Embedded Linux Systems with TPM 2.0

Offered By: Linux Foundation via YouTube

Tags

Conference Talks Courses Threat Modeling Courses

Course Description

Overview

Explore the intricacies of securing embedded Linux systems using TPM 2.0 in this comprehensive conference talk by Philip Tricca from Intel. Dive deep into threat modeling, the Intel TPM2 software stack, and implementations of mitigations using the meta-measured Open Embedded layer. Learn about the security goals achievable with TPM and the threats it can mitigate. Understand various configurations of the TPM2 software stack suitable for different Linux systems, from embedded to servers. Gain insights into system integrity, measurement architectures, and practical use cases such as RNG, crypto operations, and sealed storage. Discover how to leverage TPM 2.0 technology to enhance the security of embedded Linux systems in this informative presentation.

Syllabus

Intro
LEVEL SET
THE BASICS
THREAT MODELING
IF YOUR TEAM DOESN'T MODEL THREATS. Please do
TERMS
WHAT IS A TPM?
TPM2 IMPLEMENTATION: DOMAIN SEPARATION
TPM PROTECTIONS
INTEGRITY: MEASURED BOOT
TCG TPM2 SOFTWARE STACK: DESIGN GOALS
TPM2 SOFTWARE STACK System API & TCT specification
IMPLEMENTATION & CODE
USE CASE: RNG
USE CASE: CRYPTO OPERATIONS
USE CASE: SEALED STORAGE AKA LOCAL ATTESTATION


Taught by

Linux Foundation

Tags

Related Courses

Менеджмент информационной безопасности
Higher School of Economics via Coursera
Planning a Security Incident Response
Microsoft via edX
Identifying Security Vulnerabilities
University of California, Davis via Coursera
Secure Coding Practices
University of California, Davis via Coursera
Atlas Security
MongoDB University