fTPM - A Software-Only Implementation of a TPM Chip

fTPM - A Software-Only Implementation of a TPM Chip

USENIX via YouTube Direct link

Threat Model: What Threats are In-Scope?

11 of 24

11 of 24

Threat Model: What Threats are In-Scope?

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

fTPM - A Software-Only Implementation of a TPM Chip

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Motivation
  3. 3 Big Problem
  4. 4 Research Question
  5. 5 Outline
  6. 6 TPM: 1.0
  7. 7 New in TPM 2.0
  8. 8 ARM TrustZone Properties
  9. 9 ARM TrustZone Limitations
  10. 10 High-Level architecture
  11. 11 Threat Model: What Threats are In-Scope?
  12. 12 ARM Eco-system Offers eMMC
  13. 13 Three Approaches
  14. 14 Problem: Long-Running Commands
  15. 15 Solution: Cooperative Checkpointing
  16. 16 Background: TPM Unseal
  17. 17 Problem: Dark Periods
  18. 18 Possible Attack during Dark Period
  19. 19 Solution: Dirty Bit
  20. 20 Dirty Bit Stops Attack
  21. 21 Methodology
  22. 22 Conclusions
  23. 23 Discussion of SGX Limitations
  24. 24 Questions?

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.