Completed
Intro
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Securing Embedded Linux Systems with TPM 2.0
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 LEVEL SET
- 3 THE BASICS
- 4 THREAT MODELING
- 5 IF YOUR TEAM DOESN'T MODEL THREATS. Please do
- 6 TERMS
- 7 WHAT IS A TPM?
- 8 TPM2 IMPLEMENTATION: DOMAIN SEPARATION
- 9 TPM PROTECTIONS
- 10 INTEGRITY: MEASURED BOOT
- 11 TCG TPM2 SOFTWARE STACK: DESIGN GOALS
- 12 TPM2 SOFTWARE STACK System API & TCT specification
- 13 IMPLEMENTATION & CODE
- 14 USE CASE: RNG
- 15 USE CASE: CRYPTO OPERATIONS
- 16 USE CASE: SEALED STORAGE AKA LOCAL ATTESTATION