没有合适的资源?快使用搜索试试~ 我知道了~
首页A Practical Guide to TPM 2.0
资源详情
资源评论
资源推荐
Shelve in
Software Engineering/Software Development
User level:
Intermediate–Advanced
BOOKS FOR PROFESSIONALS BY PROFESSIONALS
®
A Practical Guide to TPM 2.0
With the Fall 2013 cybersecurity report recommendation to the President of the
United States that TPMs be universally adopted for computing devices and the
increasing interest being generated by the TPM 2.0 standard, the world of TPMs is
heating up.
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of
Security
aims to educate developers, security architects, engineering management,
and ordinary users about TPM 2.0. It describes security and TPM concepts using
diagrams, low-level code examples, and high-level use cases. The book seeks to
empower and excite the programming community to use TPMs to help solve the
current general security crisis and to educate the general public about TPM 2.0.
What You’ll Learn:
• History of TPMs and why TPM 2.0 was needed
• Security fundamentals
• TPM 2.0 architecture in detail, including use cases
• Application development options and debugging tips
• How major platform technologies make use of TPM 2.0
Arthur
Challener
97
81430 265832
53999
ISBN 978-1-4302-6583-2
For your convenience Apress has placed some of the front
matter material after the index. Please use the Bookmarks
and Contents at a Glance links to access them.
v
Contents at a Glance
About the Authors ��������������������������������������������������������������������������� xxi
About the Technical Reviewers ���������������������������������������������������� xxiii
Acknowledgments ��������������������������������������������������������������������������xxv
Introduction ����������������������������������������������������������������������������������xxvii
Chapter 1: History of the TPM ■ �������������������������������������������������������� 1
Chapter 2: Basic Security Concepts ■ ����������������������������������������������� 7
Chapter 3: Quick Tutorial on TPM 2�0 ■ ������������������������������������������� 23
Chapter 4: Existing Applications That Use TPMs ■ �������������������������� 39
Chapter 5: Navigating the Specification ■ ��������������������������������������� 51
Chapter 6: Execution Environment ■ ����������������������������������������������� 71
Chapter 7: TPM Software Stack ■ ���������������������������������������������������� 77
Chapter 8: TPM Entities ■ ���������������������������������������������������������������� 97
Chapter 9: Hierarchies ■ ���������������������������������������������������������������� 105
Chapter 10: Keys ■ ������������������������������������������������������������������������ 119
Chapter 11: NV Indexes ■ �������������������������������������������������������������� 137
Chapter 12: Platform Configuration Registers ■ ���������������������������� 151
Chapter 13: Authorizations and Sessions ■ ����������������������������������� 163
Chapter 14: Extended Authorization (EA) Policies ■ ���������������������� 217
Chapter 15: Key Management ■ ���������������������������������������������������� 249
■ Contents at a GlanCe
vi
Chapter 16: Auditing TPM Commands ■ ���������������������������������������� 263
Chapter 17: Decrypt/Encrypt Sessions ■ ��������������������������������������� 271
Chapter 18: Context Management ■ ���������������������������������������������� 289
Chapter 19: Startup, Shutdown, and Provisioning ■ ���������������������� 301
Chapter 20: Debugging ■ ��������������������������������������������������������������� 311
Chapter 21: Solving Bigger Problems with the TPM 2�0 ■ ������������ 323
Chapter 22: Platform Security Technologies ■
That Use TPM 2�0 ������������������������������������������������������������������������ 331
Index ���������������������������������������������������������������������������������������������� 349
xxvii
Introduction
“Seminal!”
“Riveting! I couldn’t put it down until the last page.”
“I’m exhausted from reading this book! It kept me up three nights in a row. Where’s
my Ambien when I need it?”
“e suspense was killing me. I just had to read it straight through!”
Although these responses to our book would be gratifying, it’s doubtful that any book
on digital security will ever garner this type of reaction. Digital security is the computer
equivalent of disaster insurance. Few people care very much about it or give it much
thought, and everyone hates paying for it … until a catastrophe hits. en we are either
really glad we had it or really sad that we didn’t have enough of it or didn’t have it at all.
We may sound like Chicken Little crying the “the sky is falling, the sky is falling,”
but mark our words: a digital security catastrophe is headed your way. We could quote
a plethora of statistics about the rising occurrence of digital security threats, but you’ve
probably heard them, and, quite frankly, you don’t care, or at least you don’t care enough.
It’s questionable whether any preaching on our part will make you care enough until
you’re personally impacted by such a calamity, but we’ll try anyway.
When your reputation is tarnished, your nances are impacted, your identity is
stolen, your physical well-being is threatened, your company’s reputation and nances
are harmed, and, quite possibly, your country is overthrown, then you’ll wake up to the
need for cyber security. But it might be too late then. Like people living in a ood zone,
the question isn’t whether the ood is coming, but rather when the disaster will hit and
whether you’ll be prepared for it. e time to buy digital-security ood insurance is now!
Don’t wait until the ood hits.
A Practical Guide to TPM 2.0 can be part of your digital-security insurance policy.
e TPM was designed as one of the core building blocks for digital security solutions. e
November 2013 “Report to the President: Immediate Opportunities for Strengthening the
Nation’s Cybersecurity” recommends “the universal adoption of the Trusted Platform
Module (TPM), an industry-standard microchip designed to provide basic security-
related functions, primarily involving encryption keys, including for phones and tablets.”
Computers and devices that incorporate a TPM are able to create cryptographic keys and
encrypt them so they can be decrypted only by the TPM. A TPM provides this limited
but fundamental set of capabilities that higher layers of cybersecurity can then leverage.
Today, TPMs are present in many laptop and desktop personal computers. ey’re used
by enterprises for tasks like secure disk encryption, but they have yet to be incorporated
to any signicant extent in smartphones, game consoles, televisions, in-car computer
systems, and other computerized devices and industrial control systems. is needs to
happen for such devices to be trustworthy constituents of the increasingly interconnected
device ecosystem.
剩余374页未读,继续阅读
feifanyyh
- 粉丝: 3
- 资源: 19
上传资源 快速赚钱
- 我的内容管理 收起
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
会员权益专享
最新资源
- 2023年中国辣条食品行业创新及消费需求洞察报告.pptx
- 2023年半导体行业20强品牌.pptx
- 2023年全球电力行业评论.pptx
- 2023年全球网络安全现状-劳动力资源和网络运营的全球发展新态势.pptx
- 毕业设计-基于单片机的液体密度检测系统设计.doc
- 家用清扫机器人设计.doc
- 基于VB+数据库SQL的教师信息管理系统设计与实现 计算机专业设计范文模板参考资料.pdf
- 官塘驿林场林防火(资源监管)“空天地人”四位一体监测系统方案.doc
- 基于专利语义表征的技术预见方法及其应用.docx
- 浅谈电子商务的现状及发展趋势学习总结.doc
- 基于单片机的智能仓库温湿度控制系统 (2).pdf
- 基于SSM框架知识产权管理系统 (2).pdf
- 9年终工作总结新年计划PPT模板.pptx
- Hytera海能达CH04L01 说明书.pdf
- 数据中心运维操作标准及流程.pdf
- 报告模板 -成本分析与报告培训之三.pptx
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功
评论0