In the context of the Master in Technopreneurship (MTECH) proposed at the University of Luxembourg, I provided the lecture serie on “Trusted Computing (TC) Paradigms and Distributed Ledger Technologies (DLTs)”.

Part I: Introduction and Trusted Computing (TC) Paradigm

   Slides Part I (PDF)

Outline

  • Introduction
    • Computing Platforms Architecture
    • Computing Taxonomy and Deployment Model
  • Computing Security Challenges and Underlying Concepts
    • Fault Tolerance
    • Cryptography TL;DR;
    • CyberSecurity TL;DR;
  • Trusted Computing (TC) Paradigm
    • Trusted Computing Group (TCG) and Trusted Platform Module (TPM)
    • TPM Architecture and Specifications
    • TPM-enabled Application Developments: TPM 2.0 Software Stack (TSS)
    • TPM 2.0 Tools [Practical] Session: tpm2-{tss-engine|pkcs11} Illustrated
    • TPM Attacks and Known Vulnerabilities
    • TPM Alternatives: Apple T2 Security Chip
    • Example of TC-based R&D: CertiCloud