How to generate and load evm-key in TPM less systems

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi Integrity team,

IMA is working fine in our embedded linux product and now we are trying to implement EVM. Our system does not have TPM but have trustzone and crypto engine. My question is:

1. What is the standard practice to generate and load evm-key in systems that does not have TPM.
2. Suppose we have an encrypted key which has been decrypted and loaded in kernel. Isn't it an attacker can analyse RAM and get the evm-key. Am I missing something here.

Regards,
Rishi

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Linux Kernel]     [Linux Kernel Hardening]     [Linux NFS]     [Linux NILFS]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux SCSI]

  Powered by Linux