TPM Software Stack - Enabling the TPM2.0 Ecosystem in Linux - Peter Hüwe & Joshua Lock
TPM 2.0 Software Stack — Philip Tricca — Platform Security Summit 2018
Getting Started with the TPM2 Software Stack (TSS2) - Philip Tricca, Intel
How to use TPM 2.0 to secure private keys
Using the TPM - It's Not Rocket Science (Anymore) - Johannes Holland & Peter Huewe
🖥 From Application to TPM 🔒 - Linux DeepDive
14 TPM - Tech Stack (Database)
11 TPM - Why tech stack
TPM Transport Security: Defeating Active Interposers with DICE
TPM2 Setup and test how it works in simulator
USENIX Security '16 - fTPM: A Software-Only Implementation of a TPM Chip
A Game-Changing Device Security Solution with Firmware TPM from SecEdge and Ubiquitous AI
TPM2.0 practical usage Using a firmware TPM 2.0 on an embedded device
Securing Embedded Linux Systems with TPM 2.0 - Philip Tricca, Intel
12 TPM - Tech Stack (Frontend)
tpm2-software.github.io - Enabling the TPM2.0 Ecosystem in Linux - Andreas Fuchs, Fraunhofer SIT
13 TPM - Tech Stack (Backend)
TPM2 0 practical usage Using a firmware TPM 2 0 on an embedded device
tpm-t3s1_002
The TPM2 software community Getting started as a user, becoming a contributor
Subsystem Update: tpm2-Software Update and Highlights - Philip Tricca, Intel
Introducing TPM NV Storage with E/A Policies and TSS-FAPI - Andreas Fuchs, Fraunhofer SIT
USENIX Security '16 - Sanctum: Minimal Hardware Extensions for Strong Software Isolation
Using the TPM NVRAM to Protect Secure Boot Keys in POWER9 OpenPOWER Systems - Claudio de Carvalho
FOSDEM 2017 - TPM2.0 practical usage.mp4