Using TPMs to Cryptographically Verify Devices at Scale
Offered By: Linux Foundation via YouTube
Course Description
Overview
Explore how Google leverages Trusted Platform Modules (TPMs) to cryptographically verify devices at scale in this 40-minute conference talk by Matthew Garrett and Tom D'Netto. Delve into the challenges of maintaining device security once it leaves IT control and learn about TPMs' unique cryptographic identities. Discover how firmware and bootloaders utilize TPMs to generate verifiable logs of the entire boot process. Gain insights into Google's methods for building trust in a geographically diverse fleet of machines, establishing strong hardware-backed identities, and using remote attestation to prove sanctioned boot chains. Learn about newly-released cross-platform open-source libraries that enable others to build similar infrastructure. The talk covers topics such as the trust problem, TPM functionality, endorsement keys, association keys, and concludes with a Q&A session.
Syllabus
Introduction
Agenda
Trust Problem
What is a TPM
Purpose of a TPM
TPM functionality
TPM endorsement keys
Association keys
Overview
Open Source
Go
Questions
Taught by
Linux Foundation
Tags
Related Courses
Mobile Devices in Everyday LifeTallinn University via EMMA Windows Support Essentials: Maintenance
Microsoft via edX Advanced IOT Applications
Indian Institute of Science Bangalore via Swayam Computer Fundamentals: Security
Pluralsight Integrating AWS IoT Core in Your Application
Pluralsight