TCE Summer School material
This page has slides of my talks at the
Third TCE Summer School on Computer Security, 2014
.
Lectures 1 and 2
Slides
Further reading:
TPM 2.0 Extended Authorization model is explained in Section 2.3 and Appendix B of
Citizen Electronic Identities using TPM 2.0
. To appear in ACM CCS TrustED workshop (2014) (
extended research report at arXiv
).
Mobile Trusted Computing
. Proceedings of the IEEE 102(8): 1189-1206 (2014)
The Untapped Potential of Trusted Execution Environments on Mobile Devices
. IEEE Security & Privacy Magazine 12(4):29-37 (2014)
Lecture 3
Slides
Last modified: Wed, Sep 10, 2014 8:31:53 AM