PPT-Trusted Platform Module and Applications

Author : mitsue-stanley | Published Date : 2016-08-06

Slide credits Based on presentations from Dennis Kafura TPM and Bryan Parno Flicker Trusted Platform Module Integrity Measurement Reporting and Evaluation Motivation

Presentation Embed Code

Download Presentation

Download Presentation The PPT/PDF document "Trusted Platform Module and Applications" is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.

Trusted Platform Module and Applications: Transcript


Slide credits Based on presentations from Dennis Kafura TPM and Bryan Parno Flicker Trusted Platform Module Integrity Measurement Reporting and Evaluation Motivation Reliance on remote clientsservers. Presenter: Raj Johnson. Getting Locked-In. Applications are developed with a particular platform in mind. The software is locked to the current platform. If a component of that platform changes, the application will no longer run without costly changes to the code due to variances in platforms. Attestation. Dane Brandon, . Hardeep. . Uppal. CSE551. University of Washington. Overview. Motivation. Trusted Computing and Trusted Platform Modules (TPM). Trusted Software Stacks. Attestation. Measurements. (Connecting your legacy hardware). By Team #6389 - . The Lazybotts. 2015-2016 Season. Outline. The new platform - What changes?. The new Modern Robotics modules. Connecting legacy hardware. The whole new system. Thomas Gaska. Lockheed Martin . MST . Owego and Binghamton . University. thomas.gaska@lmco.com. 1. Introduction. There is a future . opportunity to leverage COTS security technology being developed for the driverless car into future UAS Integrated Modular Architectures (IMAs. Elaine Shi. Lecture . 5 . Trusted Computing. Roadmap. Background on Trusted Computing. Whole-system, load-time attestation. Fine-grained, run-time attestation. or verifiable program execution. Trusted Computing & TPM. Integrity Measurement, Reporting, and Evaluation. 1. Dennis Kafura – CS5204 – Operating Systems. Motivation. Reliance on remote clients/servers. Financial records and e-commerce. Electronic medical records. Xiaolong. . Wang, . Xinming. . Ou. Based on Dr. Andrew Martin’s slides from TIW 2013. Problem. We use different devices (smartphone, laptop, tablet, Xbox, router…) and grant them with authority everyday (Gmail/Facebook account, credit card, personal info, etc.). Value Proposition for. Mobile Point of Sale (mPOS). Dongyan Wang. GlobalPlatform Technical Program Manager. Wednesday 19 March. . GP Confidential. ©2013. @GlobalPlatform_. www.linkedin.com/company/globalplatform. (Connecting your legacy hardware). By Team #6389 - . The Lazybotts. 2015-2016 Season. Outline. The new platform - What changes?. The new Modern Robotics modules. Connecting legacy hardware. The whole new system. Xiaolong. . Wang, . Xinming. . Ou. Based on Dr. Andrew Martin’s slides from TIW 2013. Problem. We use different devices (smartphone, laptop, tablet, Xbox, router…) and grant them with authority everyday (Gmail/Facebook account, credit card, personal info, etc.). Xiaolong. . Wang, . Xinming. . Ou. Based on Dr. Andrew Martin’s slides from TIW 2013. Problem. We use different devices (smartphone, laptop, tablet, Xbox, router…) and grant them with authority everyday (Gmail/Facebook account, credit card, personal info, etc.). th. , 2015. RVA.js. Bruce Pulley. Andrew Rumbley. Who are these guys?. Bruce Pulley (@. pulleymb. ). bruce@shockoe.com. Senior Mobile Applications Developer. Andrew Rumbley (@. rumbleyam. ). andrew@shockoe.com. 1. Dennis Kafura – CS5204 – Operating Systems. Motivation. Reliance on remote clients/servers. Financial records and e-commerce. Electronic medical records. Cloud computing. Threats to clients from remote servers. Integrity Revisited. James Hook. CS. 4/591. : Introduction to Computer Security. Last Time. Multilateral security models. Models that partition information to enforce need-to-know between peers. 2/7/12 13:41.

Download Document

Here is the link to download the presentation.
"Trusted Platform Module and Applications"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.

Related Documents