Secure hardware is being tasked with enabling higher levels of security and trust in devices, providing a potential cornerstone for the security of the modern IT infrastructure. In this event we first introduce the Trusted platform module (TPM), and how the current security research seeks to use it for high levels of user and device based security through refined trust. In the second part we take a closer look at the TPM in action. In this session we investigate a peculiar security setting found in one of the most prominent secure boot loading processes (Bitlocker), and we’ll talk about why this can be a grand example of “too much trust”.
Level and
prerequisites
This is a session for the IT security involved. You should
have some background knowledge about generic security concepts and
cryptography, and know what a Public Key Infrastructure is.
Speaker: Benjamin Larsen, DTU
Organizers: Philip Metin Özari & Kåre Løvgren, IDA IT
Catering at the meeting: Coffee and tea at the beginning, and a soda and fruit in the break.
Free for members of IDA IT and DANSK IT