A Practical Guide to TPM 2.0

  title={A Practical Guide to TPM 2.0},
  author={W. Arthur and D. Challener and K. Goldman},
  • W. Arthur, D. Challener, K. Goldman
  • Published in Apress 2015
  • With the Fall 2013 cybersecurity report recommendation to the President of the United States that TPMs be universally adopted for computing devices and the increasing interest being generated by the TPM 2.0 standard, the world of TPMs is heating up. A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security aims to educate developers, security architects, engineering management, and ordinary users about TPM 2.0. It describes security and TPM concepts using… CONTINUE READING
    83 Citations
    Advanced Remote Firmware Upgrades Using TPM 2.0
    • 12
    • PDF
    Runtime Firmware Product Lines Using TPM2.0
    • PDF
    Research on Application of Trusted Computing 3.0 in Industrial Control System of Nuclear Power Plant
    • Yunmin Wang, Gang Cui, Lufang Zhang, Hui Li
    • Computer Science
    • 2020 12th International Conference on Communication Software and Networks (ICCSN)
    • 2020
    A Security-Enhanced vTPM 2.0 for Cloud Computing
    • 1
    Remote Attestation based Software Integrity of IoT devices
    Hardware-Assisted Isolation Technologies: Security Architecture and Vulnerability Analysis
    Concept of Smart Building Cyber-physical Systems Including Tamper Resistant Endpoints


    Diagram from the section AMD Secure Technology in Chapter 22 Copyright © by Advanced Micro Devices
    • 2015
    // Decrypt read data. encryptedReadData.t.size = encryptParamSize
      // Roll the nonces for response RollNonces( &encryptDecryptSession, &nvRdWrRspAuths.rspAuths[1]->nonce )
        Decrypted read data = " )
          Get the command results, in this case the read data. rval = Tss2_Sys_NV_Read_Complete( sysContext, &readData )
            Intel is a trademark of Intel Corporation in the U.S. and/or other countries
              Publisher grants that Intel can re-print and reuse these diagrams and source code and that these materials are being used in this book with Intel's permission
                Publisher gratefully acknowledges the permission granted by Intel to use the following materials in this work
                • All rights and interest in that material belong to Intel
                TPM2B_MAX_BUFFER *)&decryptedReadData, (TPM2B_MAX_BUFFER *)&encryptedReadData, &nvAuth )