TPM 2.0 Software Stack — Philip Tricca — Platform Security Summit 2018
Slides: https://PlatformSecuritySummit.com/2018/speaker/Tricca
The Trusted Platform Module (TPM) has been the standard in software integrity measurement and reporting for over 15 years. TPM 2.0 became an ISO standard in 2015, a Windows 10 security requirement in 2018 and is integrated into platforms across the enterprise as a discrete part or as firmware in a TEE. Despite the pain and suffering associated with programming in past TCG APIs, TPM architecture has proven sound and useful.
This talk will cover Intel’s collaboration with partners in the TCG TPM2 Software Stack (TSS2) working group to create a set of usable APIs. Design and craftsmanship of APIs with intuitive, predictable behavior can increase developer adoption and the likelihood of critical infrastructure functioning as intended. We have made TPM2 programming architecture and APIs usable for multiple levels of abstraction and varying constraints. We’ll discuss recent successes, including open-source APIs for environments ranging from embedded firmware to desktops and servers.
The TSS2 APIs are however just a means to an end and so this talk will conclude with a discussion of projects that we aim to enable through these APIs. Specifically—richer functionality in the UEFI firmware environment, hybrid approaches for key management in hardware crypto accelerators, integration with distributed key management infrastructure, the impact of recent OSS work on user freedoms and emerging standards like the Device Identifier Composition Engine (DICE).
Видео TPM 2.0 Software Stack — Philip Tricca — Platform Security Summit 2018 канала Platform Security Summit
The Trusted Platform Module (TPM) has been the standard in software integrity measurement and reporting for over 15 years. TPM 2.0 became an ISO standard in 2015, a Windows 10 security requirement in 2018 and is integrated into platforms across the enterprise as a discrete part or as firmware in a TEE. Despite the pain and suffering associated with programming in past TCG APIs, TPM architecture has proven sound and useful.
This talk will cover Intel’s collaboration with partners in the TCG TPM2 Software Stack (TSS2) working group to create a set of usable APIs. Design and craftsmanship of APIs with intuitive, predictable behavior can increase developer adoption and the likelihood of critical infrastructure functioning as intended. We have made TPM2 programming architecture and APIs usable for multiple levels of abstraction and varying constraints. We’ll discuss recent successes, including open-source APIs for environments ranging from embedded firmware to desktops and servers.
The TSS2 APIs are however just a means to an end and so this talk will conclude with a discussion of projects that we aim to enable through these APIs. Specifically—richer functionality in the UEFI firmware environment, hybrid approaches for key management in hardware crypto accelerators, integration with distributed key management infrastructure, the impact of recent OSS work on user freedoms and emerging standards like the Device Identifier Composition Engine (DICE).
Видео TPM 2.0 Software Stack — Philip Tricca — Platform Security Summit 2018 канала Platform Security Summit
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![Securing Embedded Linux Systems with TPM 2.0 - Philip Tricca, Intel](https://i.ytimg.com/vi/0qu9R7Tlw9o/default.jpg)
![Trusting your Raspberry Pi - An introduction to the TPM and IoT - Ian Oliver - code::dive 2019](https://i.ytimg.com/vi/S6HWK8PF5MU/default.jpg)
![LinuxBoot progress: boot anything from Linux — Chris Koch, Google — Platform Security Summit 2019](https://i.ytimg.com/vi/6ktGXJBJmLM/default.jpg)
![USENIX Security '16 - fTPM: A Software-Only Implementation of a TPM Chip](https://i.ytimg.com/vi/VdqOc4Rv7QQ/default.jpg)
![Keylime - An Open Source TPM Project for Remote Trust. - Luke Hinds, Red Hat](https://i.ytimg.com/vi/YtPsruEqGeY/default.jpg)
!["TPM based attestation - how can we use it for good?" - Matthew Garrett (LCA 2020)](https://i.ytimg.com/vi/FobfM9S9xSI/default.jpg)
![Firmware security, why it matters and how you can have it](https://i.ytimg.com/vi/gP_9sUfpW_o/default.jpg)
![Guarding Against Physical Attacks: The Xbox One Story — Tony Chen, Microsoft](https://i.ytimg.com/vi/U7VwtOrwceo/default.jpg)
![Growing Risks in the Software Supply Chain — Mark Sherman, CMU — Platform Security Summit 2019](https://i.ytimg.com/vi/WmC65VrnBPI/default.jpg)
![Securing Kubernetes with Trusted Platform Module (TPM) - Alex Tcherniakhovski & Andrew Lytvynov](https://i.ytimg.com/vi/_kxmkI8Kc8Y/default.jpg)
![Remote Timing Attacks on TPMs, AKA TPM-Fail](https://i.ytimg.com/vi/QGKEwmMqwxE/default.jpg)
![Better Data Security with Commodity TPM Chips - Haris Okanovic, National Instruments](https://i.ytimg.com/vi/fu2RGBcb9aQ/default.jpg)
![Install and Configuration 802.1x EAPOL Windows Server 2016](https://i.ytimg.com/vi/FgRtfpCOlaM/default.jpg)
![Securing the Linux boot process](https://i.ytimg.com/vi/ywoMSwvxZo4/default.jpg)
![tpm2-software.github.io - Enabling the TPM2.0 Ecosystem in Linux - Andreas Fuchs, Fraunhofer SIT](https://i.ytimg.com/vi/JlpQX1_bofA/default.jpg)
![Introduction to Cloud Computing](https://i.ytimg.com/vi/QYzJl0Zrc4M/default.jpg)
![Protected Execution Facility — Guerney Hunt, IBM Research — Platform Security Summit 2019](https://i.ytimg.com/vi/6qjrqn3ug0g/default.jpg)
![What is a Trusted Platform Module (TPM)? Protecting your PC and data through hardware encryption](https://i.ytimg.com/vi/QdHKYqrV-xk/default.jpg)
![STM/PE & XHIM — Eugene Myers, NSA — Platform Security Summit 2018](https://i.ytimg.com/vi/VMBOLuN1gdU/default.jpg)
![GA-H97M-D3H Bios update with Pendrive | Gigabyte Motherboard](https://i.ytimg.com/vi/UfjxBJPWltk/default.jpg)