SlideShare a Scribd company logo
1 of 13
Download to read offline
FFRI,Inc.
1
Monthly Research
Overview and usage examples of TPM 2.0
FFRI, Inc.
http://www.ffri.jp
Ver 1.00.01
FFRI,Inc.
Introduction
• The “Trusted Platform Module (TPM)” is security chip which
have hardware tamper-resistance for cryptography.
• Specification of the TPM has designed by “Trusted Computing
Group (TCG)”.And they were released latest version TPM 2.0
in October 2014.
• It has become a high-performance configuration than before
by such as to support more encryption algorithms.
• In this report, we show the overview of TPM 2.0 and usage
example for IoT devices.
2
FFRI,Inc.
Agenda
• Basic structure of TPM
• Overview and difference between TPM 1.2 and TPM 2.0
• Threat example of IoT devices
• Usage example on IoT devices
• Applications and future of TPM
• Summary
3
FFRI,Inc.
Basic structure of TPM
4
I/O
Cryptographic
processing
Non-volatile storage
General-purpose
memory
Random number
generator
RSA key generator
SHA-1 hash
generator
encryption-decryption
signature engine
Endorsement Key(EK)
Storage Root Key(SRK)
Platform Configuration
Registers(PCR)
Attestation Identity Keys
(AIK)
Storage keys
https://en.wikipedia.org/wiki/Trusted_Platform_Module#/media/File:TPM.svg
FFRI,Inc.
Overview of TPM 2.0
• It has been enhanced from TPM 1.2 to support more
platforms.
– Adding encryption algorithms
– Enhancing availability for application
– Enhancing authentication feature
– Simplifying of TPM management
– Adding features that enhancing security of platform service
• TPM software stack specifications (TSS) have designed for
various platforms such as PC, mobile, embedded and
virtualization.
– http://www.trustedcomputinggroup.org/developers/trusted_platform_module
5
FFRI,Inc.
Difference between TPM 1.2 and TPM 2.0
• Cryptographic algorithms and primitives were added
– It becomes possible to make strong and multi-hierarchy
encryption by combining multiple algorithms.
• Multi-hierarchy
– Distribute the load of encryption
• Multiple root key
– Make strong encryption by diversification of risk
• Removing other than HMAC from authentication methods.
Adding policy authorization
– No backward compatibility
– Advanced authentication methods by password or policy are
available
• Extended Non-volatile storage(NVRAM)
– Supported counter, Bitmap, Extend
6
FFRI,Inc.
Threat example on IoT devices
• Stealing credentials from firmware by reverse engineering.
• A lot of IoT devices had been hacked by using common credentials in
same products stolen from firmware.
7
IoT devices
Getting firmware Attacker
Web sites
Credentials
Accessing by Stolen credentials
OR
Reverse
Engineering
FFRI,Inc.
Usage example on IoT devices
• It is possible to protect credentials from reverse engineering by using
TPM.
• It is impossible to steal credentials from firmware because TPM chip
has hardware tamper-resistance.
8
OR
TPM
IoT devices
Getting firmware Attacker
Web sites
Credentials
Reverse
Engineering
FFRI,Inc.
Applications of TPM
• TPM has been adopted mainly for business laptop.
– Windows Vista has supported TPM
– Windows 8 has supported TPM 2.0
– TPM is available for BitLocker which is disk encryption
feature on Windows.
– Other applications of Windows security features
• Secure Boot, Trusted Boot
• Windows Hello
• Device Guard
• Recently, the following devices also have adopted TPM.
– OnHub (Google Wi-Fi Router)
– Surface Pro 3(Microsoft Tablet)
9
FFRI,Inc.
TPM for automotive
• TCG has formulated "TPM 2.0 Automotive Thin Profile" for
automotive.
• It requires hard specs such as the following.
– Temperature, vibration, limited memory usage, reduction
in power consumption, long-term service life
• Features of “TCG TPM 2.0 Automotive Thin Profile”
– Testing ECU firmware and software integrity
– Management of encryption keys used by ECU
– Authentication and assurance of the integrity of ECU
– Secure Update of ECU firmware
– Protecting memory from write-back of information in ECU
10
FFRI,Inc.
Summary
• TPM 2.0 possible to introduce to platforms or systems easily
by such as supporting multi encryption algorithms.
• TPM is available to protect IoT devices from attacks.
• TPM is expected to apply in various fields like “TCG TPM 2.0
Automotive Thin Profile”.
11
FFRI,Inc.
References
• Trusted Platform Module - Wikipedia
https://ja.wikipedia.org/wiki/Trusted_Platform_Module
• Trusted Platform Module Library Part 1: Architecture
http://www.trustedcomputinggroup.org/files/static_page_files/8C56AE3E-1A4B-B294-
D0F43097156A55D8/TPM%20Rev%202.0%20Part%201%20-%20Architecture%2001.16.pdf
• Trusted Platform Module Library Part 2: Structures
http://www.trustedcomputinggroup.org/files/static_page_files/8C56AE3E-1A4B-B294-
D0F43097156A55D8/TPM%20Rev%202.0%20Part%201%20-%20Architecture%2001.16.pdf
• TCG PC Client Platform TPM Profile (PTP) Specification
• http://www.trustedcomputinggroup.org/files/static_page_files/28CBF489-1A4B-B294-
D038AC358AD39A6A/PC%20Client%20Specific%20Platform%20TPM%20Profile%20for%20T
PM%202%200%20v43%20150126.pdf
• インフィニオン、関心が高まっているIoTやコンピューティングに向けた認証セキュリティ技術「OPTIGA™ TPM2.0」が初め
てコモンクライテリア認証を取得 - Infineon Technologies
• http://www.infineon.com/cms/jp/about-infineon/press/press-releases/2015/INFCCS201509-
083.html
• 自動車にもPCと同じセキュリティチップ「TPM」を搭載へ、規格策定が完了
• http://monoist.atmarkit.co.jp/mn/articles/1504/14/news026.html
• TCG TPM 2.0 Automotive Thin Profile
• http://www.trustedcomputinggroup.org/files/static_page_files/72EC6BF8-1A4B-B294-
D07BBA4AE8F4A04F/TCG%20TPM%202.0%20Automotive-Thin%20Profile_v1.0.pdf
12
FFRI,Inc.
Contact Information
E-Mail : research—feedback@ffri.jp
Twitter: @FFRI_Research
13

More Related Content

Viewers also liked

Trusted Platform Module (TPM)
Trusted Platform Module (TPM)Trusted Platform Module (TPM)
Trusted Platform Module (TPM)k33a
 
How the fusion of time sensitive networking, time-triggered ethernet and data...
How the fusion of time sensitive networking, time-triggered ethernet and data...How the fusion of time sensitive networking, time-triggered ethernet and data...
How the fusion of time sensitive networking, time-triggered ethernet and data...Real-Time Innovations (RTI)
 
FactoryTalk View SE - Building a Better View
FactoryTalk View SE -  Building a Better ViewFactoryTalk View SE -  Building a Better View
FactoryTalk View SE - Building a Better ViewTony Carrara
 
Fiber Channel over Ethernet (FCoE) – Design, operations and management best p...
Fiber Channel over Ethernet (FCoE) – Design, operations and management best p...Fiber Channel over Ethernet (FCoE) – Design, operations and management best p...
Fiber Channel over Ethernet (FCoE) – Design, operations and management best p...Cisco Canada
 
Ethernet and TCP optimizations
Ethernet and TCP optimizationsEthernet and TCP optimizations
Ethernet and TCP optimizationsJeff Squyres
 
Cisco io t part cisco industrial ethernet 4000 switches, designed for harsh c...
Cisco io t part cisco industrial ethernet 4000 switches, designed for harsh c...Cisco io t part cisco industrial ethernet 4000 switches, designed for harsh c...
Cisco io t part cisco industrial ethernet 4000 switches, designed for harsh c...IT Tech
 
LAS16-400K2: TianoCore – Open Source UEFI Community Update
LAS16-400K2: TianoCore – Open Source UEFI Community UpdateLAS16-400K2: TianoCore – Open Source UEFI Community Update
LAS16-400K2: TianoCore – Open Source UEFI Community UpdateLinaro
 

Viewers also liked (10)

Trusted Platform Module (TPM)
Trusted Platform Module (TPM)Trusted Platform Module (TPM)
Trusted Platform Module (TPM)
 
How the fusion of time sensitive networking, time-triggered ethernet and data...
How the fusion of time sensitive networking, time-triggered ethernet and data...How the fusion of time sensitive networking, time-triggered ethernet and data...
How the fusion of time sensitive networking, time-triggered ethernet and data...
 
FactoryTalk View SE - Building a Better View
FactoryTalk View SE -  Building a Better ViewFactoryTalk View SE -  Building a Better View
FactoryTalk View SE - Building a Better View
 
Fiber Channel over Ethernet (FCoE) – Design, operations and management best p...
Fiber Channel over Ethernet (FCoE) – Design, operations and management best p...Fiber Channel over Ethernet (FCoE) – Design, operations and management best p...
Fiber Channel over Ethernet (FCoE) – Design, operations and management best p...
 
Ethernet and TCP optimizations
Ethernet and TCP optimizationsEthernet and TCP optimizations
Ethernet and TCP optimizations
 
Cisco io t part cisco industrial ethernet 4000 switches, designed for harsh c...
Cisco io t part cisco industrial ethernet 4000 switches, designed for harsh c...Cisco io t part cisco industrial ethernet 4000 switches, designed for harsh c...
Cisco io t part cisco industrial ethernet 4000 switches, designed for harsh c...
 
LAS16-400K2: TianoCore – Open Source UEFI Community Update
LAS16-400K2: TianoCore – Open Source UEFI Community UpdateLAS16-400K2: TianoCore – Open Source UEFI Community Update
LAS16-400K2: TianoCore – Open Source UEFI Community Update
 
推動數位革命
推動數位革命推動數位革命
推動數位革命
 
Cisco final ppt
Cisco final pptCisco final ppt
Cisco final ppt
 
Trusted Computing Base
Trusted Computing BaseTrusted Computing Base
Trusted Computing Base
 

More from FFRI, Inc.

Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARMAppearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARMFFRI, Inc.
 
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARMAppearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARMFFRI, Inc.
 
TrustZone use case and trend (FFRI Monthly Research Mar 2017)
TrustZone use case and trend (FFRI Monthly Research Mar 2017) TrustZone use case and trend (FFRI Monthly Research Mar 2017)
TrustZone use case and trend (FFRI Monthly Research Mar 2017) FFRI, Inc.
 
Android Things Security Research in Developer Preview 2 (FFRI Monthly Researc...
Android Things Security Research in Developer Preview 2 (FFRI Monthly Researc...Android Things Security Research in Developer Preview 2 (FFRI Monthly Researc...
Android Things Security Research in Developer Preview 2 (FFRI Monthly Researc...FFRI, Inc.
 
An Overview of the Android Things Security (FFRI Monthly Research Jan 2017)
An Overview of the Android Things Security (FFRI Monthly Research Jan 2017) An Overview of the Android Things Security (FFRI Monthly Research Jan 2017)
An Overview of the Android Things Security (FFRI Monthly Research Jan 2017) FFRI, Inc.
 
Black Hat Europe 2016 Survey Report (FFRI Monthly Research Dec 2016)
Black Hat Europe 2016 Survey Report (FFRI Monthly Research Dec 2016) Black Hat Europe 2016 Survey Report (FFRI Monthly Research Dec 2016)
Black Hat Europe 2016 Survey Report (FFRI Monthly Research Dec 2016) FFRI, Inc.
 
An Example of use the Threat Modeling Tool (FFRI Monthly Research Nov 2016)
An Example of use the Threat Modeling Tool (FFRI Monthly Research Nov 2016)An Example of use the Threat Modeling Tool (FFRI Monthly Research Nov 2016)
An Example of use the Threat Modeling Tool (FFRI Monthly Research Nov 2016)FFRI, Inc.
 
STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...
STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...
STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...FFRI, Inc.
 
Introduction of Threat Analysis Methods(FFRI Monthly Research 2016.9)
Introduction of Threat Analysis Methods(FFRI Monthly Research 2016.9)Introduction of Threat Analysis Methods(FFRI Monthly Research 2016.9)
Introduction of Threat Analysis Methods(FFRI Monthly Research 2016.9)FFRI, Inc.
 
Black Hat USA 2016 Survey Report (FFRI Monthly Research 2016.8)
Black Hat USA 2016  Survey Report (FFRI Monthly Research 2016.8)Black Hat USA 2016  Survey Report (FFRI Monthly Research 2016.8)
Black Hat USA 2016 Survey Report (FFRI Monthly Research 2016.8)FFRI, Inc.
 
About security assessment framework “CHIPSEC” (FFRI Monthly Research 2016.7)
About security assessment framework “CHIPSEC” (FFRI Monthly Research 2016.7) About security assessment framework “CHIPSEC” (FFRI Monthly Research 2016.7)
About security assessment framework “CHIPSEC” (FFRI Monthly Research 2016.7) FFRI, Inc.
 
Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)
Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)
Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)FFRI, Inc.
 
Black Hat Asia 2016 Survey Report (FFRI Monthly Research 2016.4)
Black Hat Asia 2016 Survey Report (FFRI Monthly Research 2016.4)Black Hat Asia 2016 Survey Report (FFRI Monthly Research 2016.4)
Black Hat Asia 2016 Survey Report (FFRI Monthly Research 2016.4)FFRI, Inc.
 
ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...
ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...
ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...FFRI, Inc.
 
CODE BLUE 2015 Report (FFRI Monthly Research 2015.11)
CODE BLUE 2015 Report (FFRI Monthly Research 2015.11)CODE BLUE 2015 Report (FFRI Monthly Research 2015.11)
CODE BLUE 2015 Report (FFRI Monthly Research 2015.11)FFRI, Inc.
 
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...FFRI, Inc.
 
Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)
Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)
Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)FFRI, Inc.
 
A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)
A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)
A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)FFRI, Inc.
 
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)FFRI, Inc.
 
Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...
Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...
Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...FFRI, Inc.
 

More from FFRI, Inc. (20)

Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARMAppearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
 
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARMAppearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
 
TrustZone use case and trend (FFRI Monthly Research Mar 2017)
TrustZone use case and trend (FFRI Monthly Research Mar 2017) TrustZone use case and trend (FFRI Monthly Research Mar 2017)
TrustZone use case and trend (FFRI Monthly Research Mar 2017)
 
Android Things Security Research in Developer Preview 2 (FFRI Monthly Researc...
Android Things Security Research in Developer Preview 2 (FFRI Monthly Researc...Android Things Security Research in Developer Preview 2 (FFRI Monthly Researc...
Android Things Security Research in Developer Preview 2 (FFRI Monthly Researc...
 
An Overview of the Android Things Security (FFRI Monthly Research Jan 2017)
An Overview of the Android Things Security (FFRI Monthly Research Jan 2017) An Overview of the Android Things Security (FFRI Monthly Research Jan 2017)
An Overview of the Android Things Security (FFRI Monthly Research Jan 2017)
 
Black Hat Europe 2016 Survey Report (FFRI Monthly Research Dec 2016)
Black Hat Europe 2016 Survey Report (FFRI Monthly Research Dec 2016) Black Hat Europe 2016 Survey Report (FFRI Monthly Research Dec 2016)
Black Hat Europe 2016 Survey Report (FFRI Monthly Research Dec 2016)
 
An Example of use the Threat Modeling Tool (FFRI Monthly Research Nov 2016)
An Example of use the Threat Modeling Tool (FFRI Monthly Research Nov 2016)An Example of use the Threat Modeling Tool (FFRI Monthly Research Nov 2016)
An Example of use the Threat Modeling Tool (FFRI Monthly Research Nov 2016)
 
STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...
STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...
STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...
 
Introduction of Threat Analysis Methods(FFRI Monthly Research 2016.9)
Introduction of Threat Analysis Methods(FFRI Monthly Research 2016.9)Introduction of Threat Analysis Methods(FFRI Monthly Research 2016.9)
Introduction of Threat Analysis Methods(FFRI Monthly Research 2016.9)
 
Black Hat USA 2016 Survey Report (FFRI Monthly Research 2016.8)
Black Hat USA 2016  Survey Report (FFRI Monthly Research 2016.8)Black Hat USA 2016  Survey Report (FFRI Monthly Research 2016.8)
Black Hat USA 2016 Survey Report (FFRI Monthly Research 2016.8)
 
About security assessment framework “CHIPSEC” (FFRI Monthly Research 2016.7)
About security assessment framework “CHIPSEC” (FFRI Monthly Research 2016.7) About security assessment framework “CHIPSEC” (FFRI Monthly Research 2016.7)
About security assessment framework “CHIPSEC” (FFRI Monthly Research 2016.7)
 
Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)
Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)
Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)
 
Black Hat Asia 2016 Survey Report (FFRI Monthly Research 2016.4)
Black Hat Asia 2016 Survey Report (FFRI Monthly Research 2016.4)Black Hat Asia 2016 Survey Report (FFRI Monthly Research 2016.4)
Black Hat Asia 2016 Survey Report (FFRI Monthly Research 2016.4)
 
ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...
ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...
ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...
 
CODE BLUE 2015 Report (FFRI Monthly Research 2015.11)
CODE BLUE 2015 Report (FFRI Monthly Research 2015.11)CODE BLUE 2015 Report (FFRI Monthly Research 2015.11)
CODE BLUE 2015 Report (FFRI Monthly Research 2015.11)
 
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...
 
Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)
Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)
Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)
 
A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)
A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)
A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)
 
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
 
Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...
Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...
Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...
 

Recently uploaded

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 

Recently uploaded (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

Overview and usage examples of TPM 2.0 (FFRI Monthly Research 2015.10)

  • 1. FFRI,Inc. 1 Monthly Research Overview and usage examples of TPM 2.0 FFRI, Inc. http://www.ffri.jp Ver 1.00.01
  • 2. FFRI,Inc. Introduction • The “Trusted Platform Module (TPM)” is security chip which have hardware tamper-resistance for cryptography. • Specification of the TPM has designed by “Trusted Computing Group (TCG)”.And they were released latest version TPM 2.0 in October 2014. • It has become a high-performance configuration than before by such as to support more encryption algorithms. • In this report, we show the overview of TPM 2.0 and usage example for IoT devices. 2
  • 3. FFRI,Inc. Agenda • Basic structure of TPM • Overview and difference between TPM 1.2 and TPM 2.0 • Threat example of IoT devices • Usage example on IoT devices • Applications and future of TPM • Summary 3
  • 4. FFRI,Inc. Basic structure of TPM 4 I/O Cryptographic processing Non-volatile storage General-purpose memory Random number generator RSA key generator SHA-1 hash generator encryption-decryption signature engine Endorsement Key(EK) Storage Root Key(SRK) Platform Configuration Registers(PCR) Attestation Identity Keys (AIK) Storage keys https://en.wikipedia.org/wiki/Trusted_Platform_Module#/media/File:TPM.svg
  • 5. FFRI,Inc. Overview of TPM 2.0 • It has been enhanced from TPM 1.2 to support more platforms. – Adding encryption algorithms – Enhancing availability for application – Enhancing authentication feature – Simplifying of TPM management – Adding features that enhancing security of platform service • TPM software stack specifications (TSS) have designed for various platforms such as PC, mobile, embedded and virtualization. – http://www.trustedcomputinggroup.org/developers/trusted_platform_module 5
  • 6. FFRI,Inc. Difference between TPM 1.2 and TPM 2.0 • Cryptographic algorithms and primitives were added – It becomes possible to make strong and multi-hierarchy encryption by combining multiple algorithms. • Multi-hierarchy – Distribute the load of encryption • Multiple root key – Make strong encryption by diversification of risk • Removing other than HMAC from authentication methods. Adding policy authorization – No backward compatibility – Advanced authentication methods by password or policy are available • Extended Non-volatile storage(NVRAM) – Supported counter, Bitmap, Extend 6
  • 7. FFRI,Inc. Threat example on IoT devices • Stealing credentials from firmware by reverse engineering. • A lot of IoT devices had been hacked by using common credentials in same products stolen from firmware. 7 IoT devices Getting firmware Attacker Web sites Credentials Accessing by Stolen credentials OR Reverse Engineering
  • 8. FFRI,Inc. Usage example on IoT devices • It is possible to protect credentials from reverse engineering by using TPM. • It is impossible to steal credentials from firmware because TPM chip has hardware tamper-resistance. 8 OR TPM IoT devices Getting firmware Attacker Web sites Credentials Reverse Engineering
  • 9. FFRI,Inc. Applications of TPM • TPM has been adopted mainly for business laptop. – Windows Vista has supported TPM – Windows 8 has supported TPM 2.0 – TPM is available for BitLocker which is disk encryption feature on Windows. – Other applications of Windows security features • Secure Boot, Trusted Boot • Windows Hello • Device Guard • Recently, the following devices also have adopted TPM. – OnHub (Google Wi-Fi Router) – Surface Pro 3(Microsoft Tablet) 9
  • 10. FFRI,Inc. TPM for automotive • TCG has formulated "TPM 2.0 Automotive Thin Profile" for automotive. • It requires hard specs such as the following. – Temperature, vibration, limited memory usage, reduction in power consumption, long-term service life • Features of “TCG TPM 2.0 Automotive Thin Profile” – Testing ECU firmware and software integrity – Management of encryption keys used by ECU – Authentication and assurance of the integrity of ECU – Secure Update of ECU firmware – Protecting memory from write-back of information in ECU 10
  • 11. FFRI,Inc. Summary • TPM 2.0 possible to introduce to platforms or systems easily by such as supporting multi encryption algorithms. • TPM is available to protect IoT devices from attacks. • TPM is expected to apply in various fields like “TCG TPM 2.0 Automotive Thin Profile”. 11
  • 12. FFRI,Inc. References • Trusted Platform Module - Wikipedia https://ja.wikipedia.org/wiki/Trusted_Platform_Module • Trusted Platform Module Library Part 1: Architecture http://www.trustedcomputinggroup.org/files/static_page_files/8C56AE3E-1A4B-B294- D0F43097156A55D8/TPM%20Rev%202.0%20Part%201%20-%20Architecture%2001.16.pdf • Trusted Platform Module Library Part 2: Structures http://www.trustedcomputinggroup.org/files/static_page_files/8C56AE3E-1A4B-B294- D0F43097156A55D8/TPM%20Rev%202.0%20Part%201%20-%20Architecture%2001.16.pdf • TCG PC Client Platform TPM Profile (PTP) Specification • http://www.trustedcomputinggroup.org/files/static_page_files/28CBF489-1A4B-B294- D038AC358AD39A6A/PC%20Client%20Specific%20Platform%20TPM%20Profile%20for%20T PM%202%200%20v43%20150126.pdf • インフィニオン、関心が高まっているIoTやコンピューティングに向けた認証セキュリティ技術「OPTIGA™ TPM2.0」が初め てコモンクライテリア認証を取得 - Infineon Technologies • http://www.infineon.com/cms/jp/about-infineon/press/press-releases/2015/INFCCS201509- 083.html • 自動車にもPCと同じセキュリティチップ「TPM」を搭載へ、規格策定が完了 • http://monoist.atmarkit.co.jp/mn/articles/1504/14/news026.html • TCG TPM 2.0 Automotive Thin Profile • http://www.trustedcomputinggroup.org/files/static_page_files/72EC6BF8-1A4B-B294- D07BBA4AE8F4A04F/TCG%20TPM%202.0%20Automotive-Thin%20Profile_v1.0.pdf 12
  • 13. FFRI,Inc. Contact Information E-Mail : research—feedback@ffri.jp Twitter: @FFRI_Research 13