TPM 2.0 Software Stack — Philip Tricca — Platform Security Summit 2018
TPM Software Stack - Enabling the TPM2.0 Ecosystem in Linux - Peter Hüwe & Joshua Lock
How to use TPM 2.0 to secure private keys
Using the TPM NVRAM to Protect Secure Boot Keys in POWER9 OpenPOWER Systems - Claudio de Carvalho
A Game-Changing Device Security Solution with Firmware TPM from SecEdge and Ubiquitous AI
Using the TPM - It's Not Rocket Science (Anymore) - Johannes Holland & Peter Huewe
🖥 From Application to TPM 🔒 - Linux DeepDive
TPM2 0 practical usage Using a firmware TPM 2 0 on an embedded device
TPM2.0 practical usage Using a firmware TPM 2.0 on an embedded device
TPM2 Setup and test how it works in simulator
Secure Embedded Systems with ST33KTPM- IDevID & WolfSSL
i was right (again).
TPM 2.0 Explained: How to Enable It and Avoid Windows 11 Errors
Secure remote firmware updates and ECU integrity protection with OPTIGA TPM 2.0
Getting Started with the TPM2 Software Stack (TSS2) - Philip Tricca, Intel
vSphere 6.7: ESXi and TPM2.0
"The privacy aspect of TPM attestation" - Imran Desai, Peter Huewe (LCA 2021 Online)
Breaking Bitlocker - Bypassing the Windows Disk Encryption
TPM 2.0 not working - "The resource requested is already in use." in Device Manager?
tpm2-software.github.io - Enabling the TPM2.0 Ecosystem in Linux - Andreas Fuchs, Fraunhofer SIT
Using TPM 2.0 As a Secure Keystore on your Laptop It's not as difficult as you think!
[BLU Livestream] Secure Keystores with TPM 2.0
Group A: Securing Embedded Linux Systems with TPM2.0
➡ What Is TPM (Trusted Platform Module} and What Does It Do?
USENIX Security '16 - fTPM: A Software-Only Implementation of a TPM Chip