Building Trust - Use Cases and Implementation of TPM 2.0 in Embedded Linux Systems

Building Trust - Use Cases and Implementation of TPM 2.0 in Embedded Linux Systems

Artwork by: Sparkelle (Yan) — Licensed under Creative Commons BY-SA 4.0

As embedded systems become increasingly interconnected, the demand for robust platform security and integrity has surged. Trusted Platform Modules (TPM), currently in version 2.0, are becoming increasingly beneficial for enhancing security in embedded systems. TPMs provide hardware-backed mechanisms for critical functions such as random number generation, cryptographic key generation, key binding and data sealing.

This presentation will explore the capabilities of TPM 2.0, focusing on several practical use cases, including:

  • Providing a unique and persistent serial number for device identification.
  • Supporting secure boot mechanisms to establish a reliable chain of trust.
  • Encrypting user data without the need for user passwords.
  • Managing application credentials securely.

Additionally, we will discuss the integration of TPM 2.0 within Yocto-based embedded systems and present strategies for automated provisioning, highlighting how these elements work together to enhance overall system security.

Presented at

  • Embedded Recipes 2025, Nice, France

Download slides

Related Posts

Yocto Vendor BSPs - The good, the bad, the ugly

Yocto Vendor BSPs - The good, the bad, the ugly

Vendor Board Support Packages (BSPs) promise a quick start, but we all know the reality: a tangled mess of demo apps, weird custom tools, and an old, unmaintained kernel. This is a nightmare for products that need to live longer than a demo on the developer’s desk.

In this talk, we get our hands dirty. Forget the polished slides; we’re going to take a live, no-holds-barred look at some real-world vendor BSPs to see the common pain points firsthand. From there, we’ll discuss what we actually need from a BSP for a production device and explore the tipping point where setting up your own clean foundation becomes the smarter choice for building products that are meant to last.

Read Post
International Women's Day - Why I wear Yocto Shirts on the Embedded World Exhibition

International Women's Day - Why I wear Yocto Shirts on the Embedded World Exhibition

Today, on the occasion of International Women’s Day, I’d like to give you an insight on working in Embedded as a woman: Why I’m searching for my best Yocto shirt and the nerdiest hoodie when I’m visiting the Embedded World exhibition.

Let’s go back some years to one of my first Embedded World visits. I was still a student doing my master’s degree in Embedded Systems. EW traditionally invites embedded students from all over Germany and adjacent countries on the third day, the student’s day. Together with some of my fellow students, I joined the trip and was looking forward to seeing new trends, talking to people, but also getting an idea where to apply for a job after finishing. At the exhibition, I started exploring together with some peers. Of course, all male. When going through the exhibition and talking to the people at the booths, I quickly recognized a pattern. The staff talked rather to the boys than to me. Mostly not quite obvious and probably not even on purpose. I think it’s about internalized stereotypes. They probably do not think that much about it, but obviously I was not a technically competent conversational partner to them at first sight, even if I asked the questions. I was an addition, an accompanying person from university or marketing. Mostly it was rather subtle, and I did not recognize it that much as the problem it was in the actual moment. But at some point we reached the Intel booth. I asked a question on something I was really curious about, and the male staff member started explaining to me and the accompanying students. During his talk, he started turning more to the boys until he showed me his back. I got a bit angry and told him directly that I would really like to hear the answer to the question I asked. Ok, bad, but human. So why am I telling this, and why do I mention Intel? Because I believe particularly such large companies should sensitize their employees working on a booth.

Read Post
Advanced System Profiling, Tracing and Trace Analysis with Perfetto in Android and Yocto

Advanced System Profiling, Tracing and Trace Analysis with Perfetto in Android and Yocto

Together with my colleague Stefan Lengfeld.

Tracing is a capable mechanism for deep system analysis and profiling with a minimal overhead. By recording defined system events, in Linux but also Android, tracing can be used to analyze concurrency or latency issues, for example. Android’s systrace tool made it easy to analyze and correlate traces and events due to a graphical UI, in order to help developers identify performance bottlenecks. The successor to this advanced and convenient tool is called Perfetto. It’s available for pure Linux too, and part of Yocto (meta-oe) since Langdale now. In the talk, we’ll have a look into

Read Post