This work provides an overview of a Trusted Platform Module (TPM), related vulnerabilities, Linux software and kernel modules. A Linux-based bootable USB image for collecting TPM properties by volunteers is designed. The image is based on an existing command-line utility for TPM benchmarking. A hybrid user interface for the utility was implemented, which can run either in a terminal or in GUI. The anonymised result can be stored on a persistent partition on the flash drive or uploaded to a repository. The solution was verified on devices with TPM 2.0, ranging from embedded systems, laptop and desktop computers to dual-socket workstations and servers.
Systematic collection of TPM 2.0 chips attributes on Linux
University
Faculty of Informatics
Date of Completion
spring 2020
Resources
Leader
Milan Brož
Student
Daniel Zaťovič