YoVDO

Using TPMs to Cryptographically Verify Devices at Scale

Offered By: Linux Foundation via YouTube

Tags

Conference Talks Courses Cybersecurity Courses Device Security Courses Remote Attestation Courses Trusted Platform Module Courses

Course Description

Overview

Explore how Google leverages Trusted Platform Modules (TPMs) to cryptographically verify devices at scale in this 40-minute conference talk by Matthew Garrett and Tom D'Netto. Delve into the challenges of maintaining device security once it leaves IT control and learn about TPMs' unique cryptographic identities. Discover how firmware and bootloaders utilize TPMs to generate verifiable logs of the entire boot process. Gain insights into Google's methods for building trust in a geographically diverse fleet of machines, establishing strong hardware-backed identities, and using remote attestation to prove sanctioned boot chains. Learn about newly-released cross-platform open-source libraries that enable others to build similar infrastructure. The talk covers topics such as the trust problem, TPM functionality, endorsement keys, association keys, and concludes with a Q&A session.

Syllabus

Introduction
Agenda
Trust Problem
What is a TPM
Purpose of a TPM
TPM functionality
TPM endorsement keys
Association keys
Overview
Open Source
Go
Questions


Taught by

Linux Foundation

Tags

Related Courses

Exploring Modern and Secure Operations of Kubernetes Clusters on the Edge
Open Data Science via YouTube
Using the Observer Effect and Cyber Feng Shui - Jacob Torrey
Hack In The Box Security Conference via YouTube
OAT - Attesting Operation Integrity of Embedded Devices
IEEE via YouTube
The Remote Working Security Conundrum - What Is Reasonably Secure Anyway?
USENIX via YouTube
Riverbed - Enforcing User-defined Privacy Constraints in Distributed Web Services
USENIX via YouTube