Secure hardware is being tasked with enabling higher levels of security and trust in devices, providing a potential cornerstone for the security of the modern IT infrastructure. In this event we first introduce the Trusted platform module (TPM), and how the current security research seeks to use it for high levels of user and device based security through refined trust. In the second part we take a closer look at the TPM in action. In this session we investigate a peculiar security setting found in one of the most prominent secure boot loading processes (Bitlocker), and we’ll talk about why this can be a grand example of “too much trust”.
This is a session for the IT security involved. You should have some background knowledge about generic security concepts and cryptography, and know what a Public Key Infrastructure is.
Speaker: Benjamin Larsen, DTU
Organizers: Philip Metin Özari & Kåre Løvgren, IDA IT
Catering at the meeting: Coffee and tea at the beginning, and a soda and fruit in the break.
Free for members of IDA IT and DANSK IT
ANYONE CAN JOIN - Most of IDA's events are open to everyone, but you must have an IDA user profile in order to participate. It's free and non-binding - create a user profile now. As a member of IDA, you get a discount on many of our events, so please sign in with your member login when you sign up for an event. Read more about the benefits of an IDA membership here.