“Is anyone out there?” — Using physical presence to turn on the Trusted Platform Module (TPM)

Malicious software can lurk in the most humorous of dancing baby videos and cause havoc on your computer. To help protect against malware taking control of your computer’s Trusted Platform Module (TPM) security hardware, computer manufacturers should follow recommendations from the Trusted Computing Group (TCG) to ship TPMs in the “off” state and require users…

1

Xian Ke

Xian colludes with coworkers as a Program Manager on the System Integrity team of Windows Security. She started full-time at Microsoft in 2004 after undergraduate and graduate work at MIT and assorted internship stints. She puts academic knowledge into practice by spending time on TPM and BitLocker administration, enterprise backup and recovery, and other areas…

3