Under Lock & Key: Using Hardware Protected Keys with the Linux Crypto API [ELCE 2019]
← Older revision | Revision as of 21:38, 7 October 2020 | ||
Line 129: | Line 129: | ||
Sub-System, Crypto API and protected keys usage.<br> | Sub-System, Crypto API and protected keys usage.<br> | ||
* [https://elinux.org/images/e/ea/Under_Lock_And_Key_ELC_2019.pdf PDF] | [https://youtu.be/GbcpwUBFGDw?list=PLbzoR-pLrL6pamOj4UifcMJf560Ph6mJp VIDEO] | * [https://elinux.org/images/e/ea/Under_Lock_And_Key_ELC_2019.pdf PDF] | [https://youtu.be/GbcpwUBFGDw?list=PLbzoR-pLrL6pamOj4UifcMJf560Ph6mJp VIDEO] | ||
+ | |||
+ | == tpm2-software.github.io - Enabling the TPM2.0 Ecosystem in Linux [ELCE 2019] == | ||
+ | '''Presenter: '''Andreas Fuchs, Infineon Technologies AG <br> | ||
+ | '''Summary:''' | ||
+ | This presentation provides information about basics of the TPM2.0 and <br> | ||
+ | certain use cases using the tpm2-software stack. <br> | ||
+ | |||
+ | * [https://elinux.org/images/8/84/OSSEU-2019-tpm2-Fuchs.pdf PDF] | [https://youtu.be/JlpQX1_bofA?list=PLbzoR-pLrL6pamOj4UifcMJf560Ph6mJp VIDEO] | ||
== Using Seccomp to Limit the Kernel Attack Surface [ELCE 2018] == | == Using Seccomp to Limit the Kernel Attack Surface [ELCE 2018] == |