Completed
Conclusions
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
fTPM - A Software-Only Implementation of a TPM Chip
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Motivation
- 3 Big Problem
- 4 Research Question
- 5 Outline
- 6 TPM: 1.0
- 7 New in TPM 2.0
- 8 ARM TrustZone Properties
- 9 ARM TrustZone Limitations
- 10 High-Level architecture
- 11 Threat Model: What Threats are In-Scope?
- 12 ARM Eco-system Offers eMMC
- 13 Three Approaches
- 14 Problem: Long-Running Commands
- 15 Solution: Cooperative Checkpointing
- 16 Background: TPM Unseal
- 17 Problem: Dark Periods
- 18 Possible Attack during Dark Period
- 19 Solution: Dirty Bit
- 20 Dirty Bit Stops Attack
- 21 Methodology
- 22 Conclusions
- 23 Discussion of SGX Limitations
- 24 Questions?