MA_SeS - Secure Embedded Systems
Introduction
In dedicated groups, read at the following (one item per group)
- What Can You Do with a TPM? and Why Old TPM Attacks Are Still Relevant and Why You Should Care
- Usability and Security of Trusted Platform Module (TPM) Library APIs
- TPM, a pattern for an architecture for trusted computing
- Software Trusted Platform Module (SWTPM) Resource Sharing Scheme for Embedded Systems
Info
You have 30 minutes for reading and resuming the content. A person will picked up to resume each of the inputs in 5 minutes, with others having read the same asked to complement what presented.
Important note: if asked for permission to access the above, make sure you use your HES-SO credentials.


