Carl Londahl

Posts by Carl Londahl:

An example of the TPM-fail vulnerability

Most recently, four security researchers disclosed two vulnerabilities on TPM modules, named collectively under the umbrella name TPM-fail. Effectively, the attack allows an attacker to leak cryptographic keys stored inside the TPM modules. More specifically, the attack is targeted at a timing-information leakage within elliptic-curve computation. Elliptic curve signatures The private and public keys are […]

27 Nov 2019 in Cyber Security