Runtime firmware product lines enable the generation of unified firmware images, i.e., a single firmware with several features can be used on several models. The device itself decides whether to unlock a feature or not. However, an attacker could alter their model and upgrade it to a higher-level model. In this paper, we propose an approach for secure runtime firmware product lines. Unified firmware images can be provisioned to a whole series of products while preventing unauthorized feature activation. Our approach is based on a Trusted Platform Module (TPM) 2.0, acting as security anchor using several new TPM 2.0 functionalities. The feasibility is shown in a proof-of-concept implementation
MasterAs mobile technology matures, mobile devices (principally smart phones and tablets) are increa...
The thesis begins with description of the TPM architecture and explanation of related terms. Basic f...
Security controls (such as encryption endpoints, payment gateways, and firewalls) rely on correct pr...
A central aspect for securing connected embedded systems are remote firmware upgrades to deal with v...
Abstract. How to build trusted firmware platform has been a research hot in computer security commun...
Part 7: TPM and Internet of ThingsInternational audienceA central aspect for securing connected embe...
Firmware updates on embedded systems are essential for patching vulnerabilities and improving the fu...
Firmware refers to device read-only resident code which includes microcode and macro-instruction-lev...
International audienceBoot firmware, like UEFI-compliant firmware, has been the target of numerous a...
The ability to update firmware in embedded systems allows end-users to patch device vulnerabilities ...
Trusted platform modules (TPMs) can provide a variety of security functionalities. However, the TPM ...
A computer hijacked by a malware may pretend that it is normal as usual and retrieve secrets from st...
Abstract: In the day to day lives of human beings commodity computers are increasingly used to acces...
or more than a decade, commercial PC platforms have been shipping with a standards-based embedded se...
Given the growing importance of Information Technology in todays vehicles with their ever increasing...
MasterAs mobile technology matures, mobile devices (principally smart phones and tablets) are increa...
The thesis begins with description of the TPM architecture and explanation of related terms. Basic f...
Security controls (such as encryption endpoints, payment gateways, and firewalls) rely on correct pr...
A central aspect for securing connected embedded systems are remote firmware upgrades to deal with v...
Abstract. How to build trusted firmware platform has been a research hot in computer security commun...
Part 7: TPM and Internet of ThingsInternational audienceA central aspect for securing connected embe...
Firmware updates on embedded systems are essential for patching vulnerabilities and improving the fu...
Firmware refers to device read-only resident code which includes microcode and macro-instruction-lev...
International audienceBoot firmware, like UEFI-compliant firmware, has been the target of numerous a...
The ability to update firmware in embedded systems allows end-users to patch device vulnerabilities ...
Trusted platform modules (TPMs) can provide a variety of security functionalities. However, the TPM ...
A computer hijacked by a malware may pretend that it is normal as usual and retrieve secrets from st...
Abstract: In the day to day lives of human beings commodity computers are increasingly used to acces...
or more than a decade, commercial PC platforms have been shipping with a standards-based embedded se...
Given the growing importance of Information Technology in todays vehicles with their ever increasing...
MasterAs mobile technology matures, mobile devices (principally smart phones and tablets) are increa...
The thesis begins with description of the TPM architecture and explanation of related terms. Basic f...
Security controls (such as encryption endpoints, payment gateways, and firewalls) rely on correct pr...