<?xml version="1.0" encoding="utf-8"?>
<!-- generator="Joomla! - Open Source Content Management" -->
<feed xmlns="http://www.w3.org/2005/Atom"  xml:lang="en-gb">
	<title type="text">Public RTD Deliverables</title>
	<subtitle type="text"></subtitle>
	<link rel="alternate" type="text/html" href="https://futuretpm.eu"/>
	<id>https://futuretpm.eu/index.php/results/public-rtd-deliverables</id>
	<updated>2023-08-07T16:42:48+00:00</updated>
	<author>
		<name>futuretpm</name>
	</author>
	<generator uri="https://www.joomla.org">Joomla! - Open Source Content Management</generator>
	<link rel="self" type="application/atom+xml" href="https://futuretpm.eu/index.php/results/public-rtd-deliverables?format=feed&amp;type=atom"/>
	<entry>
		<title>Public RTD Deliverables</title>
		<link rel="alternate" type="text/html" href="https://futuretpm.eu/index.php/results/public-rtd-deliverables/181-public-rtd-deliverables"/>
		<published>2018-03-01T07:12:20+00:00</published>
		<updated>2018-03-01T07:12:20+00:00</updated>
		<id>https://futuretpm.eu/index.php/results/public-rtd-deliverables/181-public-rtd-deliverables</id>
		<author>
			<name>Super User</name>
		</author>
		<summary type="html">&lt;div style=&quot;margin-left: 30px;&quot;&gt;



&lt;p&gt;
&lt;b&gt;&lt;a href=&quot;https://futuretpm.eu//downloads/FutureTPM-D1.1-Use-Case-and-System-Requirements-PU-M06.pdf&quot; target=&quot;_blank&quot;&gt;D1.1 FutureTPM Use Case and System Requirements || M06&lt;/a&gt;&lt;br /&gt;&lt;/b&gt;
This deliverable defines the technical requirements of FutureTPM, alongside with the requirements of the use cases. Its purpose to define the parameters for the rest of the FutureTPM project and provide the necessary input to the architecture.
&lt;/p&gt;
&lt;!-- #################################################### Entry separation line  ############################################################# --&gt;
&lt;p&gt;
&lt;b&gt;&lt;a href=&quot;https://futuretpm.eu//downloads/FutureTPM-D1.2-FutureTPM-Reference-Architecture-PU-M09.pdf&quot; target=&quot;_blank&quot;&gt;D1.2 FutureTPM Reference Architecture || M09&lt;/a&gt;&lt;br /&gt;&lt;/b&gt;
This deliverable will provide the specification of the FutureTPM reference architecture, the functional components and interfaces between them. It will provide an analysis and point of reference for the FutureTPM in relation to the
three specific use cases, including an analysis of relevant classical protocols and the use cases themselves in terms of FutureTPM functionality.
&lt;/p&gt;
&lt;!-- #################################################### Entry separation line  ############################################################# --&gt;
&lt;p&gt;
&lt;b&gt;&lt;a href=&quot;https://futuretpm.eu//downloads/FutureTPM-D1.3-Security-Risks-QR-Deployments-PU-M09.pdf&quot; target=&quot;_blank&quot;&gt;D1.3 Security Risks in QR Deployments || M09&lt;/a&gt;&lt;br /&gt;&lt;/b&gt;
This deliverable will include a documentation of the security problems and risks that classical protocols, to be employed in the three envisioned use cases, might face in the presence of quantum adversaries.
&lt;/p&gt;
&lt;!-- #################################################### Entry separation line  ############################################################# --&gt;
&lt;p&gt;
&lt;b&gt;&lt;a href=&quot;https://futuretpm.eu//downloads/FutureTPM-D2.1-First-Report-New-QR-Cryptographic_PU_M09.pdf&quot; target=&quot;_blank&quot;&gt;D2.1 First Report on New QR Cryptographic Primitives || M09&lt;/a&gt;&lt;br /&gt;&lt;/b&gt;
This deliverable reports on the work done by all tasks, including the surveys, the newly developed algorithms, and the full specification of the candidate algorithms (TPM and TSS) that are to be implemented and evaluated by WP5.
&lt;/p&gt;
&lt;!-- #################################################### Entry separation line  ############################################################# --&gt;
&lt;p&gt;
&lt;b&gt;&lt;a href=&quot;https://futuretpm.eu//downloads/FutureTPM-D3.1-First-Report-on-Security-Models-for-the-TPM-PU-M09.pdf&quot; target=&quot;_blank&quot;&gt;D3.1 First Report on Security Models for the TPM || M09&lt;/a&gt;&lt;br /&gt;&lt;/b&gt;
Initial report describing and outlining security models for various implementations of TPM.
&lt;/p&gt;
&lt;!-- #################################################### Entry separation line  ############################################################# --&gt;

&lt;p&gt;
&lt;b&gt;&lt;a href=&quot;https://futuretpm.eu//downloads/FutureTPM-D4.1-FutureTPM-Threat-Modelling-Risk-Assessment-Methodology-PU-M12.pdf&quot; target=&quot;_blank&quot;&gt;D4.1Threat Modelling &amp; Risk Assessment Methodology || M12&lt;/a&gt;&lt;br /&gt;&lt;/b&gt;
D4.1 provides the details of the Risk Assessment (RA) methodology that will be followed in FutureTPM towards the design and implementation of a holistic RA framework capable of providing vulnerability analysis and policy enforcement during both design- and run-time. It also provides the analysis of the TPM commands that will be used as the baseline for our investigation (per reference scenario). Each reference scenario will focus on one main TPM functionality including Sealing, Direct Anonymous Attestation (DAA) and Key Creation and Storage.&lt;/p&gt;
&lt;!-- #################################################### Entry separation line  ############################################################# --&gt;


&lt;p&gt;
&lt;b&gt;&lt;a href=&quot;https://futuretpm.eu//downloads/FutureTPM-D3.2-First-Report-on-the-Security-of-the-TPM-PU-M15.pdf&quot; target=&quot;_blank&quot;&gt;D3.2 First Report on the Security of the TPM || M18&lt;/a&gt;&lt;br /&gt;&lt;/b&gt;
In this report, we discuss issues related to modelling and reasoning about trust, usage and authorization policies, and the TPM’s cryptographic primitives, protocols, and realization of access control.
&lt;/p&gt;
&lt;!-- #################################################### Entry separation line  ############################################################# --&gt;



&lt;p&gt;
&lt;b&gt;&lt;a href=&quot;https://futuretpm.eu//downloads/FutureTPM-D5.1-FutureTPM-1st_version_of_implementation-PU-M18.pdf&quot; target=&quot;_blank&quot;&gt;D5.1 First version of implementation || M18&lt;/a&gt;&lt;br /&gt;&lt;/b&gt;
First version of SW based QR TSS and QR TPM.&lt;/p&gt;
&lt;!-- #################################################### Entry separation line  ############################################################# --&gt;



&lt;p&gt;
&lt;b&gt;&lt;a href=&quot;https://futuretpm.eu//downloads/FutureTPM-D.4.3-Runtime-RA-Resilience-Mitigation-Plan-1st-Release-PU-M18.pdf&quot; target=&quot;_blank&quot;&gt;D4.3 Runtime Risk Assessment, Resilience and Mitigation Planning - First Release || M20&lt;/a&gt;&lt;br /&gt;&lt;/b&gt;
This report provides complementary functionality of the risk
assessment framework delivered in D4.2. More specifically, it handles the unacceptable calculated risks by inferring (using backward-chaining techniques) the optimal mitigation actions (i.e., properties that have to be reactively attested) that have to be applied.&lt;/p&gt;
&lt;!-- #################################################### Entry separation line  ############################################################# --&gt;



&lt;p&gt;
&lt;b&gt;&lt;a href=&quot;https://futuretpm.eu//images/Deliverables/D63-Demonstrators-Implementation-Report-First-Release-PU-M24.pdf&quot; target=&quot;_blank&quot;&gt;D6.3 Demonstrators Implementation Report – First Release || M24&lt;/a&gt;&lt;br /&gt;&lt;/b&gt;
D6.3 provides a detailed documentation of the first round of experiments of the FutureTPM framework, in the context of the three envisioned use cases. It summarizes the operation of the FutureTPM demonstrators coupled with a comprehensive analysis of the integration and evaluation of the first release of the SW-based QR TPM environment enriched with lessons learnt and challenges that need to be taken into consideration during the next development, integration and evaluation cycle of the project.&lt;/p&gt;
&lt;!-- #################################################### Entry separation line  ############################################################# --&gt;




&lt;p&gt;
&lt;b&gt;&lt;a href=&quot;https://futuretpm.eu//images/Deliverables/FutureTPM-D22-Second-Report-on-New-QR-Cryptographic-Primitives-PU-M24.pdf&quot; target=&quot;_blank&quot;&gt;D2.2 Second Report on New QR Cryptographic Primitives || M26&lt;/a&gt;&lt;br /&gt;&lt;/b&gt;
This document describes the choices (and justification) of the public, symmetric and privacy-enhancing primitives for the TPM constructions.&lt;/p&gt;
&lt;!-- #################################################### Entry separation line  ############################################################# --&gt;


&lt;p&gt;
&lt;b&gt;&lt;a href=&quot;https://futuretpm.eu//images/Deliverables/FutureTPM-D33-Second-Report-on-Security-Models-for-the-TPM-PU-M24.pdf&quot; target=&quot;_blank&quot;&gt;D3.3 Second Report on Security Models for the TPM || M26&lt;/a&gt;&lt;br /&gt;&lt;/b&gt;
In this report, we deliver two main parts related to the security modelling and models for the TPM. The first part is for the design of ideal functionalities and the second part is for cryptographic model.&lt;/p&gt;
&lt;!-- #################################################### Entry separation line  ############################################################# --&gt;






&lt;p&gt;
&lt;b&gt;&lt;a href=&quot;https://futuretpm.eu//images/Deliverables/FutureTPM-D54-Report-on-implementation-PU-M30.pdf&quot; target=&quot;_blank&quot;&gt;D5.4 Report on implementation || M30&lt;/a&gt;&lt;br /&gt;&lt;/b&gt;
This deliverable will report the public overview on the final version of VM based QR TPM, HW based QR TPM and the SW-based QR TPM.&lt;/p&gt;
&lt;!-- #################################################### Entry separation line  ############################################################# --&gt;





&lt;p&gt;
&lt;b&gt;&lt;a href=&quot;https://futuretpm.eu//images/Deliverables/D34-FutureTPM-Second-Report-on-the-TPM-PU-M33.pdf&quot; target=&quot;_blank&quot;&gt;D3.4 Second Report on the Security of the TPM || M31&lt;/a&gt;&lt;br /&gt;&lt;/b&gt;
In this report, we deliver the main contributions towards modelling of TPM abstractions, with the predefined ideal functionalities, and showcase how this can be integrated in the security modelling for a specific application domain (Secure Device Management).&lt;/p&gt;
&lt;!-- #################################################### Entry separation line  ############################################################# --&gt;



&lt;p&gt;
&lt;b&gt;&lt;a href=&quot;https://futuretpm.eu//images/Deliverables/FutureTPM-D23-Third-Report-on-New-QR-Cryptographic-Primitives-PU-M36.pdf&quot; target=&quot;_blank&quot;&gt;D2.3 Third Report on New QR Cryptographic Primitives || M36&lt;/a&gt;&lt;br /&gt;&lt;/b&gt;
This document describes the choices (and justification) of the public, symmetric and privacy-enhancing primitives for the TPM constructions..&lt;/p&gt;
&lt;!-- #################################################### Entry separation line  ############################################################# --&gt;


&lt;p&gt;
&lt;b&gt;&lt;a href=&quot;https://futuretpm.eu//images/Deliverables/FutureTPM-D35-FinalReport-Design-Security-QR-TPM-PU-M36.pdf&quot; target=&quot;_blank&quot;&gt;D3.5 Final Report on the Design and Security of the QR TPM || M36&lt;/a&gt;&lt;br /&gt;&lt;/b&gt;
In this report, we put forth the final models towards verifying the security properties of the remote attestation service, as leveraged in the context of one of the envisioned FutureTPM use cases; namely the Device Management where the focus is on the secure identification and management of network devices. The produced models are based on the ideal functionalities of TPM commands that have been defined through appropriate abstractions towards formally verifying
the security properties of the executed protocols.&lt;/p&gt;
&lt;!-- #################################################### Entry separation line  ############################################################# --&gt;


&lt;p&gt;
&lt;b&gt;&lt;a href=&quot;https://futuretpm.eu//images/Deliverables/FutureTPM-D45-Runtime-Risk-Assessment-Resilience-Mitigation-Planning-PU-M36.pdf&quot; target=&quot;_blank&quot;&gt;D4.5 Runtime Risk Assessment, Resilience and Mitigation Planning || M36&lt;/a&gt;&lt;br /&gt;&lt;/b&gt;
The aim of this deliverable is to firstly present and analyse the FutureTPM dynamic and multi-level tracing solution that it provides for the monitoring of a device’s configuration and execution behavioural properties. Secondly, there is a detailed documentation of the design, implementation and performance evaluation of the two underlying technologies used; namely eBPF and IntelPT tracing capabilities. The final aim of this deliverable is to offer a constructive critique of the FutureTPM proposed optimization and set some open questions for further optimizations of real-time device data and execution stream processing and monitoring functionalities.&lt;/p&gt;
&lt;!-- #################################################### Entry separation line  ############################################################# --&gt;

&lt;p&gt;
&lt;b&gt;&lt;a href=&quot;https://futuretpm.eu//images/Deliverables/FutureTPM-D65-Final-Demonstrators-Implementation-Report-PU-M36.pdf&quot; target=&quot;_blank&quot;&gt;D6.5 Final Demonstrators Implementation Report || M36&lt;/a&gt;&lt;br /&gt;&lt;/b&gt;
This deliverable provides the final reporting on the second round of experiments of the FutureTPM framework, in the context of the three envisioned use cases. It summarizes the operation of the core FutureTPM artefacts (QR algorithms implemented in the HW-, SW, and VM-based TPM variants, Configuration Integrity Verification, and Risk Assessment) in the demonstrators coupled with a comprehensive analysis of the integration and evaluation of the second release of the overall framework. This analysis is also enriched with challenges that were taken into consideration when migrating to such QR Root-of-Trusts. The latter also acts as a preliminary documentation of the general adoption guidelines and lessons learnt, throughout the project, which will be put forth in Deliverable D6.6.&lt;/p&gt;
&lt;!-- #################################################### Entry separation line  ############################################################# --&gt;


&lt;p&gt;
&lt;b&gt;&lt;a href=&quot;https://futuretpm.eu//images/Deliverables/FutureTPM-D66-ValidationResults-Performance-Evaluation-Adoption-Guidelines-PU-M36.pdf&quot; target=&quot;_blank&quot;&gt;D6.6 Validation Results, Performance Evaluation and Adoption Guidelines || M36&lt;/a&gt;&lt;br /&gt;&lt;/b&gt;
This deliverable provides the final report of FutureTPM consortium and aims to provide a concrete evaluation of the FutureTPM framework and its building blocks. This deliverable critically appraises the technical developments of the project, highlights the lessons learnt, with regards to the implementation, integration, operation and execution of the demonstrators, while it provides adoption guidelines when it comes to the integration of QR algorithms in a Future TPM.&lt;/p&gt;
&lt;!-- #################################################### Entry separation line  ############################################################# --&gt;



&lt;/div&gt;</summary>
		<content type="html">&lt;div style=&quot;margin-left: 30px;&quot;&gt;



&lt;p&gt;
&lt;b&gt;&lt;a href=&quot;https://futuretpm.eu//downloads/FutureTPM-D1.1-Use-Case-and-System-Requirements-PU-M06.pdf&quot; target=&quot;_blank&quot;&gt;D1.1 FutureTPM Use Case and System Requirements || M06&lt;/a&gt;&lt;br /&gt;&lt;/b&gt;
This deliverable defines the technical requirements of FutureTPM, alongside with the requirements of the use cases. Its purpose to define the parameters for the rest of the FutureTPM project and provide the necessary input to the architecture.
&lt;/p&gt;
&lt;!-- #################################################### Entry separation line  ############################################################# --&gt;
&lt;p&gt;
&lt;b&gt;&lt;a href=&quot;https://futuretpm.eu//downloads/FutureTPM-D1.2-FutureTPM-Reference-Architecture-PU-M09.pdf&quot; target=&quot;_blank&quot;&gt;D1.2 FutureTPM Reference Architecture || M09&lt;/a&gt;&lt;br /&gt;&lt;/b&gt;
This deliverable will provide the specification of the FutureTPM reference architecture, the functional components and interfaces between them. It will provide an analysis and point of reference for the FutureTPM in relation to the
three specific use cases, including an analysis of relevant classical protocols and the use cases themselves in terms of FutureTPM functionality.
&lt;/p&gt;
&lt;!-- #################################################### Entry separation line  ############################################################# --&gt;
&lt;p&gt;
&lt;b&gt;&lt;a href=&quot;https://futuretpm.eu//downloads/FutureTPM-D1.3-Security-Risks-QR-Deployments-PU-M09.pdf&quot; target=&quot;_blank&quot;&gt;D1.3 Security Risks in QR Deployments || M09&lt;/a&gt;&lt;br /&gt;&lt;/b&gt;
This deliverable will include a documentation of the security problems and risks that classical protocols, to be employed in the three envisioned use cases, might face in the presence of quantum adversaries.
&lt;/p&gt;
&lt;!-- #################################################### Entry separation line  ############################################################# --&gt;
&lt;p&gt;
&lt;b&gt;&lt;a href=&quot;https://futuretpm.eu//downloads/FutureTPM-D2.1-First-Report-New-QR-Cryptographic_PU_M09.pdf&quot; target=&quot;_blank&quot;&gt;D2.1 First Report on New QR Cryptographic Primitives || M09&lt;/a&gt;&lt;br /&gt;&lt;/b&gt;
This deliverable reports on the work done by all tasks, including the surveys, the newly developed algorithms, and the full specification of the candidate algorithms (TPM and TSS) that are to be implemented and evaluated by WP5.
&lt;/p&gt;
&lt;!-- #################################################### Entry separation line  ############################################################# --&gt;
&lt;p&gt;
&lt;b&gt;&lt;a href=&quot;https://futuretpm.eu//downloads/FutureTPM-D3.1-First-Report-on-Security-Models-for-the-TPM-PU-M09.pdf&quot; target=&quot;_blank&quot;&gt;D3.1 First Report on Security Models for the TPM || M09&lt;/a&gt;&lt;br /&gt;&lt;/b&gt;
Initial report describing and outlining security models for various implementations of TPM.
&lt;/p&gt;
&lt;!-- #################################################### Entry separation line  ############################################################# --&gt;

&lt;p&gt;
&lt;b&gt;&lt;a href=&quot;https://futuretpm.eu//downloads/FutureTPM-D4.1-FutureTPM-Threat-Modelling-Risk-Assessment-Methodology-PU-M12.pdf&quot; target=&quot;_blank&quot;&gt;D4.1Threat Modelling &amp; Risk Assessment Methodology || M12&lt;/a&gt;&lt;br /&gt;&lt;/b&gt;
D4.1 provides the details of the Risk Assessment (RA) methodology that will be followed in FutureTPM towards the design and implementation of a holistic RA framework capable of providing vulnerability analysis and policy enforcement during both design- and run-time. It also provides the analysis of the TPM commands that will be used as the baseline for our investigation (per reference scenario). Each reference scenario will focus on one main TPM functionality including Sealing, Direct Anonymous Attestation (DAA) and Key Creation and Storage.&lt;/p&gt;
&lt;!-- #################################################### Entry separation line  ############################################################# --&gt;


&lt;p&gt;
&lt;b&gt;&lt;a href=&quot;https://futuretpm.eu//downloads/FutureTPM-D3.2-First-Report-on-the-Security-of-the-TPM-PU-M15.pdf&quot; target=&quot;_blank&quot;&gt;D3.2 First Report on the Security of the TPM || M18&lt;/a&gt;&lt;br /&gt;&lt;/b&gt;
In this report, we discuss issues related to modelling and reasoning about trust, usage and authorization policies, and the TPM’s cryptographic primitives, protocols, and realization of access control.
&lt;/p&gt;
&lt;!-- #################################################### Entry separation line  ############################################################# --&gt;



&lt;p&gt;
&lt;b&gt;&lt;a href=&quot;https://futuretpm.eu//downloads/FutureTPM-D5.1-FutureTPM-1st_version_of_implementation-PU-M18.pdf&quot; target=&quot;_blank&quot;&gt;D5.1 First version of implementation || M18&lt;/a&gt;&lt;br /&gt;&lt;/b&gt;
First version of SW based QR TSS and QR TPM.&lt;/p&gt;
&lt;!-- #################################################### Entry separation line  ############################################################# --&gt;



&lt;p&gt;
&lt;b&gt;&lt;a href=&quot;https://futuretpm.eu//downloads/FutureTPM-D.4.3-Runtime-RA-Resilience-Mitigation-Plan-1st-Release-PU-M18.pdf&quot; target=&quot;_blank&quot;&gt;D4.3 Runtime Risk Assessment, Resilience and Mitigation Planning - First Release || M20&lt;/a&gt;&lt;br /&gt;&lt;/b&gt;
This report provides complementary functionality of the risk
assessment framework delivered in D4.2. More specifically, it handles the unacceptable calculated risks by inferring (using backward-chaining techniques) the optimal mitigation actions (i.e., properties that have to be reactively attested) that have to be applied.&lt;/p&gt;
&lt;!-- #################################################### Entry separation line  ############################################################# --&gt;



&lt;p&gt;
&lt;b&gt;&lt;a href=&quot;https://futuretpm.eu//images/Deliverables/D63-Demonstrators-Implementation-Report-First-Release-PU-M24.pdf&quot; target=&quot;_blank&quot;&gt;D6.3 Demonstrators Implementation Report – First Release || M24&lt;/a&gt;&lt;br /&gt;&lt;/b&gt;
D6.3 provides a detailed documentation of the first round of experiments of the FutureTPM framework, in the context of the three envisioned use cases. It summarizes the operation of the FutureTPM demonstrators coupled with a comprehensive analysis of the integration and evaluation of the first release of the SW-based QR TPM environment enriched with lessons learnt and challenges that need to be taken into consideration during the next development, integration and evaluation cycle of the project.&lt;/p&gt;
&lt;!-- #################################################### Entry separation line  ############################################################# --&gt;




&lt;p&gt;
&lt;b&gt;&lt;a href=&quot;https://futuretpm.eu//images/Deliverables/FutureTPM-D22-Second-Report-on-New-QR-Cryptographic-Primitives-PU-M24.pdf&quot; target=&quot;_blank&quot;&gt;D2.2 Second Report on New QR Cryptographic Primitives || M26&lt;/a&gt;&lt;br /&gt;&lt;/b&gt;
This document describes the choices (and justification) of the public, symmetric and privacy-enhancing primitives for the TPM constructions.&lt;/p&gt;
&lt;!-- #################################################### Entry separation line  ############################################################# --&gt;


&lt;p&gt;
&lt;b&gt;&lt;a href=&quot;https://futuretpm.eu//images/Deliverables/FutureTPM-D33-Second-Report-on-Security-Models-for-the-TPM-PU-M24.pdf&quot; target=&quot;_blank&quot;&gt;D3.3 Second Report on Security Models for the TPM || M26&lt;/a&gt;&lt;br /&gt;&lt;/b&gt;
In this report, we deliver two main parts related to the security modelling and models for the TPM. The first part is for the design of ideal functionalities and the second part is for cryptographic model.&lt;/p&gt;
&lt;!-- #################################################### Entry separation line  ############################################################# --&gt;






&lt;p&gt;
&lt;b&gt;&lt;a href=&quot;https://futuretpm.eu//images/Deliverables/FutureTPM-D54-Report-on-implementation-PU-M30.pdf&quot; target=&quot;_blank&quot;&gt;D5.4 Report on implementation || M30&lt;/a&gt;&lt;br /&gt;&lt;/b&gt;
This deliverable will report the public overview on the final version of VM based QR TPM, HW based QR TPM and the SW-based QR TPM.&lt;/p&gt;
&lt;!-- #################################################### Entry separation line  ############################################################# --&gt;





&lt;p&gt;
&lt;b&gt;&lt;a href=&quot;https://futuretpm.eu//images/Deliverables/D34-FutureTPM-Second-Report-on-the-TPM-PU-M33.pdf&quot; target=&quot;_blank&quot;&gt;D3.4 Second Report on the Security of the TPM || M31&lt;/a&gt;&lt;br /&gt;&lt;/b&gt;
In this report, we deliver the main contributions towards modelling of TPM abstractions, with the predefined ideal functionalities, and showcase how this can be integrated in the security modelling for a specific application domain (Secure Device Management).&lt;/p&gt;
&lt;!-- #################################################### Entry separation line  ############################################################# --&gt;



&lt;p&gt;
&lt;b&gt;&lt;a href=&quot;https://futuretpm.eu//images/Deliverables/FutureTPM-D23-Third-Report-on-New-QR-Cryptographic-Primitives-PU-M36.pdf&quot; target=&quot;_blank&quot;&gt;D2.3 Third Report on New QR Cryptographic Primitives || M36&lt;/a&gt;&lt;br /&gt;&lt;/b&gt;
This document describes the choices (and justification) of the public, symmetric and privacy-enhancing primitives for the TPM constructions..&lt;/p&gt;
&lt;!-- #################################################### Entry separation line  ############################################################# --&gt;


&lt;p&gt;
&lt;b&gt;&lt;a href=&quot;https://futuretpm.eu//images/Deliverables/FutureTPM-D35-FinalReport-Design-Security-QR-TPM-PU-M36.pdf&quot; target=&quot;_blank&quot;&gt;D3.5 Final Report on the Design and Security of the QR TPM || M36&lt;/a&gt;&lt;br /&gt;&lt;/b&gt;
In this report, we put forth the final models towards verifying the security properties of the remote attestation service, as leveraged in the context of one of the envisioned FutureTPM use cases; namely the Device Management where the focus is on the secure identification and management of network devices. The produced models are based on the ideal functionalities of TPM commands that have been defined through appropriate abstractions towards formally verifying
the security properties of the executed protocols.&lt;/p&gt;
&lt;!-- #################################################### Entry separation line  ############################################################# --&gt;


&lt;p&gt;
&lt;b&gt;&lt;a href=&quot;https://futuretpm.eu//images/Deliverables/FutureTPM-D45-Runtime-Risk-Assessment-Resilience-Mitigation-Planning-PU-M36.pdf&quot; target=&quot;_blank&quot;&gt;D4.5 Runtime Risk Assessment, Resilience and Mitigation Planning || M36&lt;/a&gt;&lt;br /&gt;&lt;/b&gt;
The aim of this deliverable is to firstly present and analyse the FutureTPM dynamic and multi-level tracing solution that it provides for the monitoring of a device’s configuration and execution behavioural properties. Secondly, there is a detailed documentation of the design, implementation and performance evaluation of the two underlying technologies used; namely eBPF and IntelPT tracing capabilities. The final aim of this deliverable is to offer a constructive critique of the FutureTPM proposed optimization and set some open questions for further optimizations of real-time device data and execution stream processing and monitoring functionalities.&lt;/p&gt;
&lt;!-- #################################################### Entry separation line  ############################################################# --&gt;

&lt;p&gt;
&lt;b&gt;&lt;a href=&quot;https://futuretpm.eu//images/Deliverables/FutureTPM-D65-Final-Demonstrators-Implementation-Report-PU-M36.pdf&quot; target=&quot;_blank&quot;&gt;D6.5 Final Demonstrators Implementation Report || M36&lt;/a&gt;&lt;br /&gt;&lt;/b&gt;
This deliverable provides the final reporting on the second round of experiments of the FutureTPM framework, in the context of the three envisioned use cases. It summarizes the operation of the core FutureTPM artefacts (QR algorithms implemented in the HW-, SW, and VM-based TPM variants, Configuration Integrity Verification, and Risk Assessment) in the demonstrators coupled with a comprehensive analysis of the integration and evaluation of the second release of the overall framework. This analysis is also enriched with challenges that were taken into consideration when migrating to such QR Root-of-Trusts. The latter also acts as a preliminary documentation of the general adoption guidelines and lessons learnt, throughout the project, which will be put forth in Deliverable D6.6.&lt;/p&gt;
&lt;!-- #################################################### Entry separation line  ############################################################# --&gt;


&lt;p&gt;
&lt;b&gt;&lt;a href=&quot;https://futuretpm.eu//images/Deliverables/FutureTPM-D66-ValidationResults-Performance-Evaluation-Adoption-Guidelines-PU-M36.pdf&quot; target=&quot;_blank&quot;&gt;D6.6 Validation Results, Performance Evaluation and Adoption Guidelines || M36&lt;/a&gt;&lt;br /&gt;&lt;/b&gt;
This deliverable provides the final report of FutureTPM consortium and aims to provide a concrete evaluation of the FutureTPM framework and its building blocks. This deliverable critically appraises the technical developments of the project, highlights the lessons learnt, with regards to the implementation, integration, operation and execution of the demonstrators, while it provides adoption guidelines when it comes to the integration of QR algorithms in a Future TPM.&lt;/p&gt;
&lt;!-- #################################################### Entry separation line  ############################################################# --&gt;



&lt;/div&gt;</content>
		<category term="Public RTD Deliverables" />
	</entry>
</feed>
