YoVDO

Vulnerabilities in the TPM 2.0 Reference Implementation Code

Offered By: WEareTROOPERS via YouTube

Tags

TROOPERS Courses Cybersecurity Courses Vulnerability Assessment Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore vulnerabilities in the TPM 2.0 reference implementation code through this in-depth conference talk delivered by Francisco Falcon at TROOPERS23, an IT security conference held in Heidelberg, Germany on June 29th, 2023. Gain valuable insights into the potential security risks associated with Trusted Platform Module (TPM) 2.0, a widely used technology for hardware-based security. Discover the findings of Falcon's research and understand the implications for IT security professionals and organizations relying on TPM 2.0. Learn about the latest developments in hardware security and how vulnerabilities in reference implementations can impact real-world systems. This talk, hosted by @ERNW_ITSec, is part of the cutting-edge content presented at TROOPERS23, offering attendees a chance to stay ahead of emerging threats in the rapidly evolving field of IT security.

Syllabus

TROOPERS23: Vulnerabilities in the TPM 2.0 reference implementation code


Taught by

WEareTROOPERS

Related Courses

Modmob Tools - Home Made Tools to Test Mobile Devices and Monitor Networks
WEareTROOPERS via YouTube
Microsoft IT - Secure Journey to IPv6-Only
WEareTROOPERS via YouTube
Introducing Faction - A Modern, Powerful, Multiplayer C2 Framework
WEareTROOPERS via YouTube
A Diet of Poisoned Fruit - Designing Implants and OT Payloads for ICS Embedded Devices
WEareTROOPERS via YouTube
Hardware Side Channel Attacks on the Cheapest
WEareTROOPERS via YouTube