We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Securing Embedded Systems with fTPM implemented as Trusted Application in TEE

Formal Metadata

Title
Securing Embedded Systems with fTPM implemented as Trusted Application in TEE
Title of Series
Number of Parts
779
Author
Contributors
License
CC Attribution 2.0 Belgium:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
In this presentation, we will discuss how to enhance the security of embedded systems using a Trusted Execution Environment (TEE) to implement a Firmware Trusted Platform Module (fTPM) as a Trusted Application (TA). We will cover the benefits of using TEE and fTPM, and additionally, we will provide an example of how to implement that and demonstrate the code. It is important to note that there is already a kernel driver available that supports fTPM in TEE, which can be found in the latest Linux kernel source code [1]. Part of this talk will cover examples available on Microsoft GitHub [2] page which provide a guide on how to implement fTPM on ARM32 platforms. Attendees will leave with a better understanding of how to leverage TEE and fTPM, as well as the knowledge and tools needed to implement fTPM on their embedded systems and enhance their security.