Using TPMs to Cryptographically Verify Devices at Scale - Matthew Garrett & Tom D'Netto, Google
Using DevIDs and TPMs for Node Attestation - Adriane Cardozo, Marcos Yedro
Hardware backed attestation in TLS by Ionuț Mihalcea (Arm) | OC3 2023
USENIX Security '21 - DICE*: A Formally Verified Implementation of DICE Measured Boot
What is Device Attestation? | Entity Attestation Tokens Explained | PSA Certified Security Goals
TPMs Can't Be Hacked - Cybersecurity Mythbusters
What are TPMs used for and why? | One Dev Question
Simon Frost an Thomas Fossati: Project Veraison - Verification of Attestation
"TPM based attestation - how can we use it for good?" - Matthew Garrett (LCA 2020)
TPM 2.0 Flaws Allow Cryptographic Key Theft via Out-of-Bounds Read and Write Exploits
"The privacy aspect of TPM attestation" - Imran Desai, Peter Huewe (LCA 2021 Online)
NFV infrastructure and service attestation
Secure SW based Attestation on ARM devices
Making Remote Attestation Useful on Linux - Brandon Weeks & Matthew Garrett, Google
Hardware-backed Per-process Secrets - Matthew Garrett, Aurora
Remote Attestion (IFAG)
Does System.Security.Cryptography.RandomNumberGenerator use the TPM's RNG?
SCALE 11x: The Secure Boot Journey with Matthew Garrett
TPM Transport Security: Defeating Active Interposers with DICE
Formal Analysis and Implementation of a TPM 2.0-based Direct Anonymous Attestation Scheme