Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a critical security vulnerability in Trusted Platform Modules (TPMs) through this 39-minute Black Hat conference talk. Delve into the world of hardware-based root of trust and learn how TPMs protect cryptographic keys from privileged systems and physical adversaries. Discover the speaker's findings on black-box timing analysis of TPM 2.0 devices in commodity computers, revealing secret-dependent execution times. Gain insights into potential remote timing attacks on these essential security components found in smartphones, industrial systems, and various computing platforms. Presented by Daniel Moghimi, this talk sheds light on the implications of TPM-Fail and its impact on hardware-based security measures.