Trustworthy Shield – A Cheap TPM Module for Older Systems
Hack In The Box Security Conference via YouTube
Overview
This course aims to teach learners about trusted computing and how it can serve as an active defense technology against security threats like ransomware. The goal is to introduce Trustworthy Shield, a cheap TPM module designed for older systems lacking hardware-level trusted computing support. The course covers the history and technology of trusted computing, the features of TPM chips, trusted computing platforms, policy management, IoT device management, trusted applications, and concludes with insights on the topic. The intended audience for this course includes security researchers, professionals working in the field of trust computing, and individuals interested in enhancing the security of older computer systems.
Syllabus
Introduction
Who am I
History of Trusted Computing
Technology of Trusted Computing
Trustworthy Shield
Chips
Features
Trusted Computing Platform
Trusted Server
Policy Management
IoT Devices Management
Trusted Application
Conclusion
Taught by
Hack In The Box Security Conference