Under Lock & Key: Using Hardware Protected Keys with the Linux Crypto API [ELCE 2019]

← Older revision Revision as of 21:38, 7 October 2020
Line 129: Line 129:
 
Sub-System, Crypto API and protected keys usage.<br>
 
Sub-System, Crypto API and protected keys usage.<br>
 
* [https://elinux.org/images/e/ea/Under_Lock_And_Key_ELC_2019.pdf PDF] | [https://youtu.be/GbcpwUBFGDw?list=PLbzoR-pLrL6pamOj4UifcMJf560Ph6mJp VIDEO]
 
* [https://elinux.org/images/e/ea/Under_Lock_And_Key_ELC_2019.pdf PDF] | [https://youtu.be/GbcpwUBFGDw?list=PLbzoR-pLrL6pamOj4UifcMJf560Ph6mJp VIDEO]
 +
 +
== tpm2-software.github.io - Enabling the TPM2.0 Ecosystem in Linux [ELCE 2019] ==
 +
'''Presenter: '''Andreas Fuchs, Infineon Technologies AG <br>
 +
'''Summary:'''
 +
This presentation provides information about basics of the TPM2.0 and <br>
 +
certain use cases using the tpm2-software stack. <br>
 +
 +
* [https://elinux.org/images/8/84/OSSEU-2019-tpm2-Fuchs.pdf PDF] | [https://youtu.be/JlpQX1_bofA?list=PLbzoR-pLrL6pamOj4UifcMJf560Ph6mJp VIDEO]
  
 
== Using Seccomp to Limit the Kernel Attack Surface [ELCE 2018] ==
 
== Using Seccomp to Limit the Kernel Attack Surface [ELCE 2018] ==