YoVDO

Using TPMs to Cryptographically Verify Devices at Scale

Offered By: Linux Foundation via YouTube

Tags

Conference Talks Courses Cybersecurity Courses Device Security Courses Remote Attestation Courses Trusted Platform Module Courses

Course Description

Overview

Explore how Google leverages Trusted Platform Modules (TPMs) to cryptographically verify devices at scale in this 40-minute conference talk by Matthew Garrett and Tom D'Netto. Delve into the challenges of maintaining device security once it leaves IT control and learn about TPMs' unique cryptographic identities. Discover how firmware and bootloaders utilize TPMs to generate verifiable logs of the entire boot process. Gain insights into Google's methods for building trust in a geographically diverse fleet of machines, establishing strong hardware-backed identities, and using remote attestation to prove sanctioned boot chains. Learn about newly-released cross-platform open-source libraries that enable others to build similar infrastructure. The talk covers topics such as the trust problem, TPM functionality, endorsement keys, association keys, and concludes with a Q&A session.

Syllabus

Introduction
Agenda
Trust Problem
What is a TPM
Purpose of a TPM
TPM functionality
TPM endorsement keys
Association keys
Overview
Open Source
Go
Questions


Taught by

Linux Foundation

Tags

Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube