Security

A Practical Guide to TPM 2.0: Using the Trusted Platform by Will Arthur, David Challener, Kenneth Goldman PDF

By Will Arthur, David Challener, Kenneth Goldman

ISBN-10: 1430265833

ISBN-13: 9781430265832

A realistic advisor to TPM 2.0: utilizing the depended on Platform Module within the New Age of protection is a straight-forward primer for builders. It exhibits safeguard and TPM suggestions, demonstrating their utilization in genuine functions that the reader can test out.

Simply positioned, this booklet is designed to empower and excite the programming group to head out and do cool issues with the TPM. The method is to ramp the reader up speedy and preserve their curiosity. a pragmatic consultant to TPM 2.0: utilizing the depended on Platform Module within the New Age of protection explains safety innovations, describes TPM 2.0 structure, and gives coding examples in parallel starting with extremely simple recommendations and straightforward code to hugely complicated thoughts and code.

The publication comprises entry to a dwell execution setting (secure, hosted virtualization) and genuine code examples to get readers up and chatting with the TPM fast. The authors then aid the clients extend on that with genuine examples of valuable apps utilizing the TPM.

Show description

Read or Download A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security PDF

Similar security books

Data Hiding: Exposing Concealed Data in Multimedia, - download pdf or read online

As facts hiding detection and forensic concepts have matured, everyone is developing extra complex stealth tools for spying, company espionage, terrorism, and cyber war all to prevent detection. info Hiding presents an exploration into the current day and subsequent iteration of instruments and methods utilized in covert communications, complex malware tools and knowledge concealment strategies.

Download e-book for iPad: Digital CCTV - A Security Professional's Guide by Emily M. Harwood

The results of electronic expertise at the safeguard require consistent vigilance through defense vendors, revenues employees, and set up execs. this day and for the foreseeable destiny, all safety execs should have at the very least a simple realizing of electronic expertise. electronic CCTV addresses this new problem.

Read e-book online Intelligence and Security Informatics: Pacific Asia PDF

Intelligence and safety informatics (ISI) is worried with the learn of the advance and use of complex info applied sciences and structures for nationwide, foreign, and societal security-related purposes. the yearly IEEE foreign convention sequence on ISI was once all started in 2003 and the 1st 4 conferences have been held within the usa.

Download e-book for iPad: Global Energy Policy and Security by Vlasios Voudouris (auth.), Walter Leal Filho, Vlasios

Regardless of efforts to extend renewables, the worldwide power combine remains to be prone to be ruled by way of fossil-fuels within the foreseeable destiny, really fuel for electrical energy and oil for land, air and sea shipping. The reliance on depleting traditional oil and common fuel assets and the geographic distribution of those reserves could have geopolitical implications for power importers and exporters.

Additional resources for A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security

Sample text

And many people who do know about TPMs are surprised to discover that many applications are written for them. 2 devices. 0 directly. 0, both basic and advanced. This chapter starts by looking at the various application interfaces that are used by programs to interface with the TPM hardware. Then you examine a number of applications that already use TPMs. Perhaps the most interesting part of the chapter—and one we hope you will help make out of date—is a short list of types of programs that should use TPMs but don’t.

Wave Systems Embassy Suite Wave Systems has written software to a TPM-specific interface, rather than to a higher-level interface such as PKCS #11. It needed to be done that way, to take advantage of the TPM’s attestation capabilities. Because these capabilities aren’t addressed in any other crypto-coprocessor, they aren’t available in standard interfaces such as PKCS #11. Wave Systems uses the TCG TSS interface implemented in TrouSerS to talk to the TPM, manage the TPM owner password, create attestation identity keys (AIKs), and attest to those values via a standard called Trusted Network Connect, which communicates back to an administrative server.

But if a different application took ownership of the TPM and set the owner authorization to a random number, protected by a back-end management function, it was unknown even to the end user. Some applications did this. If applications did not know how to coordinate with that back-end management application, they could not function. The result was that the user was restricted to using a single suite of applications with the TPM, in order to allow all applications to have access to the authorizations they needed.

Download PDF sample

A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security by Will Arthur, David Challener, Kenneth Goldman


by David
4.1

Rated 4.18 of 5 – based on 28 votes