Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore the limitations and security pitfalls of Trusted Platform Module (TPM) implementation in embedded devices through this 30-minute conference talk from BSidesMunich. Examine why TPM technology, while valuable, is not a comprehensive security solution and discover the common vulnerabilities and implementation challenges that can compromise embedded device security. Learn about real-world attack vectors, design flaws, and security gaps that persist even when TPM is properly integrated into embedded systems. Gain insights into the practical limitations of hardware security modules and understand the importance of implementing layered security approaches rather than relying solely on TPM for device protection. Analyze case studies and examples that demonstrate how attackers can bypass or exploit weaknesses in TPM-based security implementations, and discover best practices for building more robust security architectures in embedded environments.
Syllabus
TPM Is No Silver Bullet: Pitfalls In Embedded Device Security - David Gstir
Taught by
BSidesMunich