Download presentation
Presentation is loading. Please wait.
1
Building a Trustworthy Computer
Matthew Garrett
2
Trusting computers means trusting software
3
Computers contain a lot of software
4
Applications
5
Operating system
6
System firmware
7
Device firmware
8
You need to trust all of it
9
Can you?
10
Application signing
11
Secure Boot
12
How do we verify firmware?
13
Trusted Platform Modules
14
Every stage of your boot process measures the next
15
Values are written to the TPM
16
TPM can perform cryptographic operations based on the values
17
TPM can report these values to a remote machine
18
(This is exactly as terrifying as it sounds)
19
Local verification is hard
20
Anti Evil Maid
21
(Static secret printed on screen)
22
Anti Evil Maid 2 Turbo Edition
23
Dynamic secret using TOTP and phone app
24
Device firmware still unsolved
25
(Some operating system and firmware mitigation possible)
26
What is a trustworthy computer?
27
One where we can verify all software
28
Source code for everything
29
Cryptographic validation for everything
30
Ability to replace all code
31
User control over roots of trust
32
Some way to go yet
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.