Skip to content

MA_SeS - Secure Embedded Systems

Introduction

In dedicated groups, read at the following (one item per group)

  1. What Can You Do with a TPM? and Why Old TPM Attacks Are Still Relevant and Why You Should Care
  2. Usability and Security of Trusted Platform Module (TPM) Library APIs
  3. TPM, a pattern for an architecture for trusted computing
  4. Software Trusted Platform Module (SWTPM) Resource Sharing Scheme for Embedded Systems

Info

You have 30 minutes for reading and resuming the content. A person will picked up to resume each of the inputs in 5 minutes, with others having read the same asked to complement what presented.

Important note: if asked for permission to access the above, make sure you use your HES-SO credentials.

Course Slides

Resources