Firmware Security

  1. Hardware-Enabled Security Foundations
    1. Trusted Platform Module (TPM)
      1. TPM Architecture and Functions
        1. TPM 1.2 vs TPM 2.0
          1. Cryptographic Key Generation
            1. Secure Storage and Sealing
              1. Random Number Generation
              2. Platform Configuration Registers (PCRs)
                1. Measurement Storage
                  1. PCR Banks
                    1. Use in Attestation
                      1. Extend Operations
                      2. Key Hierarchy and Management
                        1. Endorsement Key (EK)
                          1. Storage Root Key (SRK)
                            1. Attestation Identity Key (AIK)
                              1. Key Derivation Functions
                              2. TPM Commands and Operations
                                1. Administrative Commands
                                  1. Cryptographic Operations
                                    1. Attestation Commands
                                    2. Remote Attestation
                                      1. Attestation Protocols
                                        1. Quote Generation
                                          1. Use Cases and Applications
                                        2. Intel Security Technologies
                                          1. Intel Boot Guard
                                            1. Verified Boot Process
                                              1. Policy Enforcement
                                                1. Key Management
                                                2. Intel BIOS Guard
                                                  1. BIOS Update Protection
                                                    1. Rollback Prevention
                                                      1. Secure Update Process
                                                      2. Intel Software Guard Extensions (SGX)
                                                        1. Secure Enclave Creation
                                                          1. Application Isolation
                                                            1. Memory Encryption
                                                            2. Converged Security and Management Engine (CSME)
                                                              1. Platform Security Services
                                                                1. Firmware Management
                                                                  1. Security Vulnerabilities
                                                                  2. Intel Trusted Execution Technology (TXT)
                                                                    1. Dynamic Root of Trust
                                                                      1. Measured Boot Extensions
                                                                    2. AMD Security Technologies
                                                                      1. AMD Secure Processor (PSP)
                                                                        1. Secure Boot Capabilities
                                                                          1. Cryptographic Operations
                                                                            1. Platform Security Functions
                                                                            2. Secure Encrypted Virtualization (SEV)
                                                                              1. Memory Encryption
                                                                                1. Virtual Machine Isolation
                                                                                  1. Key Management
                                                                                  2. Platform Secure Boot (PSB)
                                                                                    1. Boot Process Protection
                                                                                      1. Key Management
                                                                                        1. Policy Enforcement
                                                                                        2. AMD Memory Guard
                                                                                          1. Memory Encryption
                                                                                            1. Protection Mechanisms
                                                                                          2. ARM TrustZone
                                                                                            1. Architecture Overview
                                                                                              1. Secure World and Normal World
                                                                                                1. Isolation Mechanisms
                                                                                                  1. Secure Resource Management
                                                                                                  2. Secure Monitor
                                                                                                    1. Secure Monitor Call (SMC)
                                                                                                      1. Context Switching
                                                                                                        1. Secure Service Invocation
                                                                                                        2. TrustZone Implementation
                                                                                                          1. Hardware Components
                                                                                                            1. Software Components
                                                                                                              1. Security Policies