Week 6 (Hardware Security)

The material is subdivided in small videos. Please, watch the videos and go through the reading material in your own time. Also remember to work on the accompanying exercises sheet

Video Links Reading Material
Rootkit video pdf ppt N/A
Attack Surface & Trusted Computing Base video pdf ppt N/A
Trusted Platform Module video pdf ppt Sailer et al. “Design and Implementation of a TCG-based Integrity Measurement Architecture.” USENIX Security Symposium. 2004. pdf
Intel SGX video pdf ppt Van Bulck, Jo, et al. “A tale of two worlds: Assessing the vulnerability of enclave shielding runtimes.” ACM Conference on Computer and Communications Security. 2019. pdf video
ARM Trustzone video pdf ppt Android’s Trusty

Q&A Session