Analysis of Pin and TPM for Microsoft Laptops
نویسنده
چکیده
1. Implement Pin2 + TPM on laptops. Under this alternative, a user will be prompted for a Pin before the computer boots. Once the user authenticates, they will be prompted for the OS password to gain access to the computer. This authentication scheme is very strong, but is slightly disruptive because users may need two credentials instead of one to access their device. 2. Implement TPM only on laptops. Under this alternative, the user is prompted only for the OS password. The information on the device is still fully encrypted, but the device becomes vulnerable to a small set of attacks. For example, if an attacker can exploit a vulnerability in a service that boots before the OS password prompt, a skilled attacker could possibly gain access to the data on the device.
منابع مشابه
A Formal Analysis of Authentication in the TPM
The Trusted Platform Module (TPM) is a hardware chip designed to enable commodity computers to achieve greater levels of security than is possible in software alone. To this end, the TPM provides a way to store cryptographic keys and other sensitive data in its shielded memory. Through its API, one can use those keys to achieve some security goals. There are 300 million TPMs currently in existe...
متن کاملA User Protection Model for the Trusted Computing Environment
Information security presents a huge challenge for both individuals and organizations. The Trusted Computing Group (TCG) has introduced the Trusted Platform Module (TPM) as a solution to end-users to ensure their privacy and confidentiality. TPM has the role of being the root of trust for systems and users by providing protected storage that is accessible only within TPM and thus, protects comp...
متن کاملApplication of TPM indicators for analyzing work time of machines used in the pressure die casting
The article presents the application of total productive maintenance (TPM) to analyze the working time indicators of casting machines with particular emphasis on failures and unplanned downtime to reduce the proportion of emergency operation for preventive maintenance and diagnostics. The article presents that the influence of individual factors of complex machinery maintenance (TPM) is ...
متن کاملAttacking the BitLocker Boot Process
We discuss five attack strategies against BitLocker, which target the way BitLocker is using the TPM sealing mechanism. BitLocker is a disk encryption feature included in some versions of Microsoft Windows. It represents a state-of-the-art design, enhanced with TPM support for improved security. We show that, under certain assumptions, a dedicated attacker can circumvent the protection and brea...
متن کاملTraditional Persian topical medications for gastrointestinal diseases
Drug delivery across the skin is used for several millennia to ease gastrointestinal (GI) ailments in Traditional Persian Medicine (TPM). TPM topical remedies are generally being applied on the stomach, lower abdomen, lower back and liver to alleviate GI illnesses such as dyspepsia, gastritis, GI ulcers, inflammatory bowel disease, intestinal worms and infections. The aim of the present study i...
متن کامل