Automatic Analysis of Security Properties of the TPM

  • Mark D. Ryan
Conference paper

DOI: 10.1007/978-3-642-35371-0_1

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7711)
Cite this paper as:
Ryan M.D. (2012) Automatic Analysis of Security Properties of the TPM. In: Mitchell C.J., Tomlinson A. (eds) Trusted Systems. INTRUST 2012. Lecture Notes in Computer Science, vol 7711. Springer, Berlin, Heidelberg

The TPM and Some Attacks

The trusted platform module (TPM) is a hardware chip designed to enable commodity computers to achieve greater levels of security than is possible in software alone. There are 300 million TPMs currently in existence, mostly in highend laptops, but now increasingly in desktops and servers. Application software such as Microsoft’s BitLocker and HP’s ProtectTools use the TPM in order to guarantee security properties. The TPM specification is an industry standard [1] and an ISO/IEC standard [2] co-ordinated by the Trusted Computing Group.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Mark D. Ryan
    • 1
  1. 1.School of Computer ScienceUniversity of BirminghamUK

Personalised recommendations