The IBM TSS 2.0 stack

Session information has not yet been published for this event.


One Line Summary

Introduction to the IBM TSS 2.0 stack


An introduction to the features and benefits of the IBM TSS 2.0 stack, along with its development priorities and future plans.


  • 1191


    I am a member of the Security Department.

    I am the IBM representative to the Trusted Computing Group (TCG), TPM working group, PC Client working group, and Compliance working group. I am the editor of the TPM 1.2 and TPM 2.0 specifications. I’m also working on applying TCG technology to virtualization and hypervisors. I have a complete Unix and Windows TPM 2.0 implementation available for download under a BSD license as IBM’s Software TPM 2.0. with a companion Unix and Windows TSS 2.0 at IBM’s TPM 2.0 TSS. I have a complete software TPM 1.2 implementation available for download under a BSD license as IBM’s Software Trusted Platform Module. I also assist all IBM product groups that are implementing TCG technology.

    I am a coauthor of “A Practical Guide to TPM 2.0 Using the Trusted Platform Module in the New Age of Security”, avaliable as a free download from Apress.

    Secure hardware projects include the IBM 4758, 4764, and 4765 secure cryptographic coprocessors, and their application to secure enterprise code signing.

    Previous projects include Matchbox and secure federated data mining, two projects that applied a secure cryptographic coprocessor to the problem of sharing databases among parties with limited trust in each other. Echeck and Identrus/Eleanor applied smart card technology to electronic payments.