Automatic Analysis of Security Properties of the TPM
- Cite this paper as:
- Ryan M.D. (2012) Automatic Analysis of Security Properties of the TPM. In: Mitchell C.J., Tomlinson A. (eds) Trusted Systems. INTRUST 2012. Lecture Notes in Computer Science, vol 7711. Springer, Berlin, Heidelberg
The TPM and Some Attacks
The trusted platform module (TPM) is a hardware chip designed to enable commodity computers to achieve greater levels of security than is possible in software alone. There are 300 million TPMs currently in existence, mostly in highend laptops, but now increasingly in desktops and servers. Application software such as Microsoft’s BitLocker and HP’s ProtectTools use the TPM in order to guarantee security properties. The TPM specification is an industry standard  and an ISO/IEC standard  co-ordinated by the Trusted Computing Group.
Unable to display preview. Download preview PDF.