Securing Embedded Linux Systems with TPM 2.0

Securing Embedded Linux Systems with TPM 2.0

Linux Foundation via YouTube Direct link

IF YOUR TEAM DOESN'T MODEL THREATS. Please do

5 of 16

5 of 16

IF YOUR TEAM DOESN'T MODEL THREATS. Please do

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Securing Embedded Linux Systems with TPM 2.0

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 LEVEL SET
  3. 3 THE BASICS
  4. 4 THREAT MODELING
  5. 5 IF YOUR TEAM DOESN'T MODEL THREATS. Please do
  6. 6 TERMS
  7. 7 WHAT IS A TPM?
  8. 8 TPM2 IMPLEMENTATION: DOMAIN SEPARATION
  9. 9 TPM PROTECTIONS
  10. 10 INTEGRITY: MEASURED BOOT
  11. 11 TCG TPM2 SOFTWARE STACK: DESIGN GOALS
  12. 12 TPM2 SOFTWARE STACK System API & TCT specification
  13. 13 IMPLEMENTATION & CODE
  14. 14 USE CASE: RNG
  15. 15 USE CASE: CRYPTO OPERATIONS
  16. 16 USE CASE: SEALED STORAGE AKA LOCAL ATTESTATION

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.