YoVDO

Securing TPM Secrets with TXT and Kernel Signatures

Offered By: Linux Foundation via YouTube

Tags

Data Security Courses Secure Boot Courses UEFI Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a cutting-edge approach to securing data in TPM2's NVRAM using Intel's TXT and tboot extensions for kernel signature verification. Delve into the design and progress of a system that aims to restrict access to TPM2-stored data exclusively to kernels signed by authorized entities, while maintaining robustness during kernel upgrades and downgrades. Compare this innovative solution to existing methods employing traditional TXT and UEFI Secure Boot, understanding their limitations in terms of protection and usability. Gain insights from Paul Moore of Cisco as he presents this work-in-progress, offering a comprehensive look at enhancing data security in modern computing environments.

Syllabus

Securing TPM Secrets with TXT and Kernel Signatures - Paul Moore, Cisco


Taught by

Linux Foundation

Tags

Related Courses

Secrets Of The Motherboard - Shit My Chipset Says
44CON Information Security Conference via YouTube
Bootstrapping an Architectural Research Platform
Cooper via YouTube
Baring the System - New Vulnerabilities in SMM of Coreboot and UEFI Based Systems
Recon Conference via YouTube
Linux auf dem Desktop
media.ccc.de via YouTube
Breaking Firmware Trust From Pre-EFI - Exploiting Early Boot Phases
Black Hat via YouTube