SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : WAVX: Wave Systems Corp.

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: jakes_dad who wrote (494)9/26/2009 9:23:03 PM
From: TREND1   of 604
 
Does this article say attacks are possible ????
*************************************************
Posted by: jakes_dad Date: Saturday, September 26, 2009 8:44:22 PM
In reply to: None Post # of 182471

Fooling the Trusted Platform Module using a simple reset

security1.win.tue.nl

5 Conclusion

This paper presented the basic information about Trusted Computing which was necessary to
understand the reset attack, which was the only real attack on the Trusted Platform Module
as far as i know. Because Trusted Computing (a new kind of computing) is fairly new,
together with the fact that this Trusted Platform Module isn't widely deployed yet it might
be possible that side-channel attacks for this hardware chip are not yet been developed and
executed.
With the use of Microsoft Vista and Microsoft Bitlocker software it is expected that the use
of the TPM will grow rapidly resulting in more attacks in the (near) future.
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext