Recovery from firmware vulnerabilities in TPM.pdf

编号:161242 PDF 37页 791.41KB 下载积分:VIP专享
下载报告请您先登录!

Recovery from firmware vulnerabilities in TPM.pdf

1、Recovery from Vulnerabilities in TPM FirmwareEnhancing the TPM API for forward securityJeff Andersen,Staff Software Engineer,GoogleRecovery from Vulnerabilities in TPM FirmwareSecurity and Data ProtectionMost code has bugs:we fix the ones we can find before release,but there may be hidden onesThere

2、is a lot of code running on modern machines,from voltage regulators,to BIOS,up to userlandDont ever release bugs is not a strategySoftware bugs give us job securityStep 1:Release best-effort softwareStep 2:Find bugs and fix themStep 3:Roll out fixesStep 4:Verify the fixes have been appliedStep 5:Got

3、o step 1Critical capability:recoveryMutable code/configuration is measured before it runsMeasurements are stored in the TPMs memoryRemotely verifying softwareKernelBIOSUserspaceFlashFile systemAppAppAppMeasurementsTPMTPM:Trusted Platform ModuleMutable code/configuration is measured before it runsMea

4、surements are stored in the TPMs memoryThe TPM emits cryptographic proof of the measurements to a relying partyKernelBIOSUserspaceAppAppAppMeasurementsTPMRemote VerifierAttestationPolicyFlashFile systemTPM:Trusted Platform ModuleRemotely verifying softwareAttestations are signed with a key held by t

5、he TPMThe TPM must keep this key secretIf a bug causes the TPM to leak this secret,attestation and recovery dont workThe TPM must keep a secretKernelBIOSUserspaceAppAppAppMeasurementsTPMFlashFile systemTPM:Trusted Platform ModuleOne definition of TCB:the amount of code you need to blindy trust not t

6、o have bad bugsThe smaller the betterTrusted Computing BaseKernelBIOSUserspaceAppAppAppTPMOut of TCBIn TCBPlatform-dependentFlashFile systemTPM:Trusted Platform ModuleRecovery is not possible for bad bugsthat cause the TPM to leak its secretsOne definition of TCB:the amount of code you need to blind

友情提示

1、下载报告失败解决办法
2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
4、本站报告下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。

本文(Recovery from firmware vulnerabilities in TPM.pdf)为本站 (张5G) 主动上传,三个皮匠报告文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知三个皮匠报告文库(点击联系客服),我们立即给予删除!

温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。
客服
商务合作
小程序
服务号
折叠