Главная
Study mode:
on
1
Intro
2
Motivation
3
Big Problem
4
Research Question
5
Outline
6
TPM: 1.0
7
New in TPM 2.0
8
ARM TrustZone Properties
9
ARM TrustZone Limitations
10
High-Level architecture
11
Threat Model: What Threats are In-Scope?
12
ARM Eco-system Offers eMMC
13
Three Approaches
14
Problem: Long-Running Commands
15
Solution: Cooperative Checkpointing
16
Background: TPM Unseal
17
Problem: Dark Periods
18
Possible Attack during Dark Period
19
Solution: Dirty Bit
20
Dirty Bit Stops Attack
21
Methodology
22
Conclusions
23
Discussion of SGX Limitations
24
Questions?
Description:
Explore a comprehensive presentation from USENIX Security '16 on fTPM, a software-only implementation of a TPM chip. Delve into the challenges of building trusted systems using commodity CPU architectures like ARM and Intel, and discover how to overcome these obstacles to create software systems with security guarantees comparable to dedicated trusted hardware. Learn about the design and implementation of a firmware-based TPM 2.0 (fTPM) leveraging ARM TrustZone, which serves as the reference implementation for millions of mobile devices. Gain insights into the mechanisms needed for fTPM that can be applied to develop more sophisticated trusted applications. Examine topics such as TPM 1.0 and 2.0, ARM TrustZone properties and limitations, high-level architecture, threat models, and solutions to challenges like long-running commands and dark periods. Conclude with a discussion on SGX limitations and participate in a Q&A session to deepen your understanding of this innovative approach to trusted computing. Read more

fTPM - A Software-Only Implementation of a TPM Chip

USENIX
Add to list
0:00 / 0:00