Skip to content
Permalink
Branch: master
Find file Copy path
Find file Copy path
Fetching contributors…
Cannot retrieve contributors at this time
41 lines (41 sloc) 1.74 KB
categories description image session_attendee_num session_id session_room session_slot session_speakers session_track tag tags title youtube_video_url amazon_s3_presentation_url amazon_s3_video_url
bkk19
In this talk we are going to look into what it means to run a TEE in a TPM and answer questions like, what are the benefits and what the trade-offs when you are running a software based TPM in a TEE as a firmware TPM. For the second part of the talk we intend to have a more open discussion with the audience, where we want to discuss use cases and what kind changes that are necessary in boot components to be able talk to software based TPM instead of a real TPM.
featured path
true
/assets/images/featured-images/bkk19/BKK19-215.png
64
BKK19-215
Session Room 3 (Lotus 10)
end_time start_time
2019-04-02 09:20:00
2019-04-02 08:30:00
speaker_bio speaker_company speaker_image speaker_location speaker_name speaker_position speaker_username
Joakim has been a Linux user for about 15 years where he spent most of the time in his professional career working with security for embedded devices. The last five years he has been heading Security Working Group in Linaro who are working with various upstream projects related to Security where OP-TEE is one of the key projects for that group.
Linaro
/assets/images/speakers/bkk19/joakim-bech.jpg
Sweden
Joakim Bech
Principal Engineer
joakim.bech
Security
session
Boot Architecture
IoT Fog/Gateway/Edge Computing
Security
BKK19-215 - TPM in TEE
You can’t perform that action at this time.