SCADEMY logo, back to home

Advanced TPM Security

CL-ATP

Virtual classroom

3 days

Ends with an exam

Audience: Developers

Preparedness: General C/C++ development

Exercises: Hands-on

Advanced TPM Security
Advanced TPM Security

The course will start with a brief overview of cryptographic principles, symmetric, asymmetric encryption, hash-based authentication, digital signatures, the public key architectures and the use of OpenSSL basic commands as the TPM programming will heavily build on these principles.

TPM chip features form a complex toolset in order to provide root of trust protection, measurement of integrity, secure storage and secure auditing and reporting. All these features are backed with key management, organized into special hierarchies. In order to provide a robust solution for measuring the integrity of software and build a secure boot loading procedure, the TPM chips use so-called Platform Counter Registers (PCR). Several exercises will help to understand the operation of the PCR based hash calculation mechanism. The secure and protected storage is solved by the TPM with the concept of non-volatile memory blocks addressed by NV indexes, which also have special forms, like NV Counters, Bit Fields and NV Extend Indexes. Besides these TPM specific concepts, the usual crypto primitives and how TPM supports their secure execution will also be discussed and demonstrated by hands-on exercises.

The more complex application of TPM based secure solutions will be demonstrated on a sample application framework that was developed for educational purposes. This demonstration application covers the topics of device identification, firmware integrity protection, secure boot loader, chain of trust verification remote attestation and encryption-based solutions. Within this application framework on one hand, we will be able to demonstrate the typical implementation mistakes, pitfalls of past incidents that led to exploitable security weaknesses and on the other hand provide hands-on exercises for the participants to implement their secure solutions based on TPM chip features.

The course is supplemented with real world case studies connected to the explained topics.


Outline

IT security and secure coding

Practical cryptography

Basic TPM security features

TPM based Cryptographic Operations

Firmware Integrity Protection

Remote Attestation

Principles of security and secure coding

Knowledge sources


Participants attending this course will

Understand basic concepts of security, IT security and secure coding

Have a practical understanding of cryptography

Learn about various TPM security features

Learn about TPM based Cryptographic Operations

Understand the concept of PKI based device identification

Learn about Firmware integrity protection

Learn about Chain of trust verification

Learn about Remote attestation

Understand the concept of TPM boot loading




Our students say

0 of 0

Instructor-led courses
Instructor-led courses

Handle complex subjects, provide practical skills training, and hands-on experience, enable discussion and collaboration, and maintain the motivation and accountability of learners.

 Large-scale trainings
Large-scale trainings

Courses with couple of thousands of participants to be conducted in a short time frame, in any time zone, on-site or online.

Academic knowledge, practical application
Academic knowledge, practical application

Utilzing our R&D&I we combine academic knowledge with practical application, we develop and tailor courses to latest trends and clients' needs.

Proprietary platform with virtual machines
Proprietary platform with virtual machines

We use our proprietary platform with virtual machines for a safe practice, coding, and experimentation environment.

Hi SCADEMY Team,

My name isand my email is
I'd like to get more information aboutcourse for
The number of people would participate in the course
Man and woman
Find us here:

Budafoki street 187-189.
Budapest, 1117, Hungary

+36 1 205 3098

These courses could interest you, too:

Go to full course catalog

Trusted by top companies and brands:

EvosoftAirbusKnorr-BremseGE HealthCareEricssonSiemensNokiaBMW GroupLenovoConaxNAGRAAtosBeldenCode42VolvoElektrobitAXAKongsbergEvosoftAirbusKnorr-BremseGE HealthCareEricssonSiemensNokiaBMW GroupLenovoConaxNAGRAAtosBeldenCode42VolvoElektrobitAXAKongsberg