The Trusted Platform Module (TPM) is a system component designed to estab- lish trust in a platform by providing protected storage, robust platform integrity.
The TPM provides a way to store cryptographic keys and other sensitive values in its shielded memory and act as Root of Trust for Storage (RTS). The TPM ...
The TPM provides a way to store cryptographic keys and other sensitive values in its shielded memory and act as Root of Trust for Storage (RTS). The TPM ...
In this paper, we conduct a formal analysis of the protected storage part of API commands in the TPM 2.0 specification w.r.t secrecy property. A formal security ...
Nov 21, 2024 · The TPM interacts with applications via a predefined set of commands (an API). In this paper, we give an abstraction model for the TPM 2.0 ...
Jianxiong Shao, Dengguo Feng, Yu Qin: Type-Based Analysis of Protected Storage in the TPM (full version). IACR Cryptol. ePrint Arch. 2013: 501 (2013).
In the authors' study, they conduct a formal analysis of the TPM2.0 HMAC (hash message authentication code) authorisation mechanism used in the key management.
People also ask
What are the different types of TPM security?
What are the three TPM 2.0 hierarchies?
What data is stored on TPM?
What does TPM measure?
Trusted computing introduces the Trusted Platform Module (TPM) as a root of trust on an otherwise untrusted computer. The TPM can be used to restrict the ...
Mar 13, 2014 · TPM protections are based on the concepts of Protected Capabilities and Protected Objects. A Protected. Capability is an operation that must ...
Type-Based Analysis of Protected Storage in the TPM · J. ShaoD. FengYu Qin. Computer Science, Engineering. International Conference on Information… 2013. TLDR.