Главная
Study mode:
on
1
Introduction
2
What is TPM
3
What is a TPM
4
TPM Software Stack
5
TPM Software
6
Boot Measurements
7
Platform Configuration Registers
8
Dynamic Chain of Trust
9
Pre UEFI
10
Example Key Management
11
Software Updates
12
User Applications
13
Crypto Token Interface
14
TPM API
15
Open Smart Card Project
16
How to Break Everything
17
TPM Security Model
18
Authentication
19
TPM OTP
20
Conclusion
21
Questions
Description:
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only! Grab it Explore the world of Trusted Platform Module (TPM) chips in this 38-minute conference talk by Haris Okanovic from National Instruments. Dive into the fundamentals of TPM technology, its software stack, and its role in enhancing data security. Learn about boot measurements, platform configuration registers, and the dynamic chain of trust. Discover key management techniques, software update processes, and user applications leveraging TPM. Gain insights into the TPM security model, authentication methods, and one-time password (OTP) implementation. Understand potential vulnerabilities and how to address them for robust system security.

Better Data Security with Commodity TPM Chips

Linux Foundation
Add to list