TPM 2.0 Security
Author: Oleg Verner
These days vendors add built-in Trusted Platform Module (TPM) chips to almost every computer, especially to mobile devices (laptops, tablets, smartphones). Since such devices get thinner and thinner, PCI and Mini PCI card slots, through which information security hardware was normally plugged, are becoming history. In these circumstances the role of security chips drastically increases.
At Black Hat 2010 in Arlington, Christopher Tarnovsky (Flylogic Engineering) announced that he managed to hack the cryptoprocessor TPM Infineon SLE 66 CL PC. How did the developers of the chip respond? The new version – TPM 2.0 is coming soon. What advanced features will the chip’s architecture include? How likely are discoveries of new ways of exploitations? What is the probable development scenario of Trusted Computer Group standards?
Oleg Verner has more than 15 years of experience in information security. He conducted security audits, was among the developers of centralized agents management system of the first Russian IKE/IPsec VPN. He has been contributing to the standards of the Trusted Computing Group for several years, and frequently speaks at the international conference TRUST.