Analysis of Pin and TPM for Microsoft Laptops

نویسنده

  • Marshall Kuypers
چکیده

1. Implement Pin2 + TPM on laptops. Under this alternative, a user will be prompted for a Pin before the computer boots. Once the user authenticates, they will be prompted for the OS password to gain access to the computer. This authentication scheme is very strong, but is slightly disruptive because users may need two credentials instead of one to access their device. 2. Implement TPM only on laptops. Under this alternative, the user is prompted only for the OS password. The information on the device is still fully encrypted, but the device becomes vulnerable to a small set of attacks. For example, if an attacker can exploit a vulnerability in a service that boots before the OS password prompt, a skilled attacker could possibly gain access to the data on the device.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Formal Analysis of Authentication in the TPM

The Trusted Platform Module (TPM) is a hardware chip designed to enable commodity computers to achieve greater levels of security than is possible in software alone. To this end, the TPM provides a way to store cryptographic keys and other sensitive data in its shielded memory. Through its API, one can use those keys to achieve some security goals. There are 300 million TPMs currently in existe...

متن کامل

A User Protection Model for the Trusted Computing Environment

Information security presents a huge challenge for both individuals and organizations. The Trusted Computing Group (TCG) has introduced the Trusted Platform Module (TPM) as a solution to end-users to ensure their privacy and confidentiality. TPM has the role of being the root of trust for systems and users by providing protected storage that is accessible only within TPM and thus, protects comp...

متن کامل

Application of TPM indicators for analyzing work time of machines used in the pressure die casting

The article presents the application of total productive maintenance (TPM) to analyze the working time indicators of casting machines with particular emphasis on failures and unplanned downtime to reduce the proportion of emergency operation for preventive maintenance and diagnostics. The article presents that the influence of individual factors of complex machinery maintenance (TPM) is ...

متن کامل

Attacking the BitLocker Boot Process

We discuss five attack strategies against BitLocker, which target the way BitLocker is using the TPM sealing mechanism. BitLocker is a disk encryption feature included in some versions of Microsoft Windows. It represents a state-of-the-art design, enhanced with TPM support for improved security. We show that, under certain assumptions, a dedicated attacker can circumvent the protection and brea...

متن کامل

Traditional Persian topical medications for gastrointestinal diseases

Drug delivery across the skin is used for several millennia to ease gastrointestinal (GI) ailments in Traditional Persian Medicine (TPM). TPM topical remedies are generally being applied on the stomach, lower abdomen, lower back and liver to alleviate GI illnesses such as dyspepsia, gastritis, GI ulcers, inflammatory bowel disease, intestinal worms and infections. The aim of the present study i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016