Hardware Root of Trust - It’s Real This Time!

Secure systems are built on a layered model. At the very bottom of the stack you have to trust something - but what can you trust? A Hardware Root of Trust p...

DevConf2.3K views42:42

🔥 Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in Spain under the topic 'real murcia - nàstic'.

About this video

Secure systems are built on a layered model. At the very bottom of the stack you have to trust something - but what can you trust? A Hardware Root of Trust provides this critical foundation for secure systems. A HW RoT is included in virtually every server and laptop shipped over the last decade - yet is almost entirely unused! We will cover why this happened, what has changed, and what to expect in the future. We will use TPM 2.0 as a Hardware RoT. We will introduce the TPM 2.0 module, the TCG Software Stack (TSS), cover the operations it can perform, and explore the userspace tools that simplify using TPM 2.0. We will show a concrete example of the application of TPM, by using Clevis to automatically unlock an encrypted root volume on boot by storing an encrypted key in the TPM.

Video Information

Views
2.3K

Total views since publication

Likes
26

User likes and reactions

Duration
42:42

Video length

Published
Feb 25, 2019

Release date

Quality
hd

Video definition

About the Channel

Tags and Topics

This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:

Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.