Presentation is loading. Please wait.

Presentation is loading. Please wait.

Lecture 10 Page 1 CS 236 Online Prolog to Lecture 10 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.

Similar presentations


Presentation on theme: "Lecture 10 Page 1 CS 236 Online Prolog to Lecture 10 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher."— Presentation transcript:

1 Lecture 10 Page 1 CS 236 Online Prolog to Lecture 10 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher

2 Lecture 10 Page 2 CS 236 Online The Recent TPM Crack TPM is hardware meant to provide various forms of security Guarantees of boot sequence operations Secure key storage Remote attestations A TPM chip was recently cracked

3 Lecture 10 Page 3 CS 236 Online What Does That Mean? Exactly what got cracked, and what are the implications? One security expert cracked one chip –A chip he owned and had complete control of He extracted the chip’s secret keys –Allowing him to falsify anything supposedly signed by the TPM

4 Lecture 10 Page 4 CS 236 Online How Did He Do It? Physical attack on chip –Shaving off parts of the material –Little tiny probes applied to little tiny wires Required great expertise –And very special equipment Took several months

5 Lecture 10 Page 5 CS 236 Online Does This Mean TPM is Dead? Not at all Attack was on one type of chip –Albeit a popular one Attack cracked key of only that chip –Cracking another chip would require the same effort Attack only possible if one has physical control of the chip

6 Lecture 10 Page 6 CS 236 Online What TPM Uses Does Attack Put in Question? Not secure booting –Why would you want to screw yourself? Not secure storage of keys for the owner Does put into question all issues of remote attestation –E.g., using TPM for digital rights management


Download ppt "Lecture 10 Page 1 CS 236 Online Prolog to Lecture 10 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher."

Similar presentations


Ads by Google