YoVDO

TPM Based Attestation - How Can We Use It for Good?

Offered By: linux.conf.au via YouTube

Tags

linux.conf.au Courses Cybersecurity Courses System Security Courses Trusted Platform Module Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the potential of TPM-based attestation for enhancing security and trust in a conference talk from linux.conf.au 2020. Delve into the functionality of Trusted Platform Modules, the generation of cryptographically verifiable event logs during the boot process, and the creation of signed quotes to prove expected software execution to remote sites. Discover how to leverage attestation data for protecting network resources, solving SSH host key trust issues in enterprise environments, and facilitating system recovery for users on the go. Learn about newly released open-source software for building novel attestation solutions that protect end users without compromising privacy or control. Gain insights into TPM identity, Attestation Keys, Platform Configuration Registers, and the challenges of remote attestation with fixed PCR values.

Syllabus

Intro
What is a TPM?
What is the identity of a TPM?
Why is there an AK?
What can we do with an AK?
What's a Platform Configuration Register (PCR)?
Bringing everything together: Remote Attestation
Fixed PCR values are hard to work with
What if remote attestation, but
Not ready for production yet


Taught by

linux.conf.au

Related Courses

Enterprise System Management and Security
University of Colorado System via Coursera
Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam
PHP: Complete Login and Registration System with PHP & MYSQL
Udemy
Learn Ethical Hacking From Scratch 2024
Udemy
Serie Windows Server Update Services (WSUS)
Udemy