Главная
Study mode:
on
1
Intro
2
The Raspberry Pi
3
How does it boot up
4
The TPM device driver
5
Random number generator
6
Whats inside
7
Hierarchies
8
Taking ownership of the TPM
9
Generating keys
10
Generating an RSA key
11
Generating an AS key
12
Load external keys
13
Exercise to redux
14
Encryption
15
NVRAM
16
NVRAM area
17
Measured boot
18
Default usages
19
TCG
20
We faked it
21
How we faked it
22
Raspberry Pi
23
Quote
24
TPM structure
25
Remote attestation
26
Rebooting
27
How it works
28
Define NVRAM area
29
Read from NVRAM area
30
Evil made attack
31
Changing the PCR
32
Backing up data
33
Open SSL
34
Safety Critical Systems
Description:
Explore the integration of Trusted Platform Modules (TPM) with Raspberry Pi to establish secure and trustworthy IoT systems in this 55-minute conference talk from code::dive 2019. Delve into the fundamentals of integrity and trusted computing, learning how to build a chain of trust on a Raspberry Pi. Discover run-time TPM usage and boot-time measurement techniques, while understanding their applications in creating dependable IoT devices. Examine the limitations of Raspberry Pi in this context and investigate methods to mitigate supply-chain security risks and firmware attacks using TPM. Gain insights from Ian Oliver, a Distinguished Member of Technical Staff at Nokia Bell Labs, as he shares his expertise in trustworthy and high-integrity Network Function Virtualisation systems, privacy engineering, and formal methods.

Trusting Your Raspberry Pi - An Introduction to the TPM and IoT

code::dive conference
Add to list
0:00 / 0:00