Under CopyrightTürpe, S.S.TürpePoller, A.A.PollerSteffan, J.J.SteffanStotz, J.-P.J.-P.StotzTrukenmüller, J.J.Trukenmüller2022-03-1019.11.20082008https://publica.fraunhofer.de/handle/publica/35886610.24406/publica-fhg-358866We discuss attack scenarios against the TPM-based boot process of BitLocker. Bit Locker is a disk volume encryption feature included in some recent versions of Microsoft Windows. BitLocker is capable of using the TPM to manage all or a portion of its secret encryption keys. Specifically it uses the sealing feature to ensure keys are released only if the platform is in a predefined, trusted state. We present six ways in which an attacker may gain access to secret key material by manipulating the boot process in ways not prevented by the trusted computing technology. We also discuss their causes and contributing factors.entrusted computingauthenticated bootBitLockerWindows Vistadisk encryptionsecurity004Attacking the BitLocker boot processpresentation