September 2018
Intermediate to advanced
412 pages
11h 12m
English
The TPM is often built into a system to provide hardware-based security. It is a combination of hardware and software to protect credentials when they are in an unencrypted form. TPM is based on a trusted execution environment (hardware root of trust) that provides secure storage of credentials and protected execution of cryptographic operations. It is isolated from the main CPU and implemented either as a discrete chip, a security coprocessor, or in firmware: