Wednesday
Room 3
13:40 - 14:40
(UTC+01)
Talk (60 min)
How to Know Your Client Is Real: Hardware-Backed Authentication Patterns
Most security architectures focus on proving the server’s identity to the client, but not the other way around. This gap creates opportunities for attackers to impersonate legitimate clients through stolen credentials, compromised devices, or sophisticated spoofing techniques. Traditional methods like API keys or static certificates are no longer enough.
This session explores modern, hardware-backed patterns for client authentication that go beyond simple secrets. We will examine how TPMs, Apple’s Secure Enclave, hardware attestation, automated certificate delivery, HTTP message signatures, and mTLS can work together to provide verifiable client identity with strong cryptographic guarantees.
Through real-world examples, we will break down how these technologies fit together, where they differ, and how to layer them to build resilient, zero trust authentication architectures. Attendees will learn practical integration strategies spanning hardware attestation, certificate management, and transport-level verification, and how to apply these patterns to stop client impersonation in production environments.
