Главная
Study mode:
on
1
Introduction
2
The Problem
3
Protecting TPM Secrets
4
Secure Boot
5
UEFI Secure Boot
6
Intel TXT
7
Lessons from TXT
8
Proposed Solution
9
Open Issues
10
Current Status
11
Questions
12
Kernel rollback
13
Authorities
14
Notes
15
Conclusion
16
Question
Description:
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only! Grab it Explore a cutting-edge approach to securing TPM2 NVRAM data using Intel's TXT and tboot extensions for kernel signature verification in this 33-minute conference talk. Delve into the design and progress of a solution that aims to restrict access to TPM2-stored data exclusively to kernels signed by authorized entities while maintaining robustness during kernel upgrades and downgrades. Compare this innovative approach with existing solutions utilizing traditional TXT and UEFI Secure Boot, understanding their limitations in terms of protection and usability. Gain insights into the proposed solution, open issues, current status, and participate in a Q&A session covering topics such as kernel rollback and authorities.

Securing TPM Secrets with TXT and Kernel Signatures

Linux Foundation
Add to list