TCPA/TCG and NGSCB: Benefits and Risks for Users
نویسنده
چکیده
Trusted computing has been proposed as a way to enhance computer security and privacy significantly by including them in the design of computing platforms instead of adding them on top of an inherently insecure foundation; however, the project has attracted much criticism. This dissertation looks at trusted computing from the user perspective. Possible beneficial uses of the technology are brought up, and some of the raised criticism is discussed. The criticism is analyzed in an attempt to find out if the criticism is correct on all points, or if some of it is the result of misinformation or misunderstanding. The conclusion is that not all the arguments against trusted computing are correct, and that the possible implications for users are taken into account in the development process. The dissertation ends on a positive note, concluding that trusted computing is possible without the worst fears of the critics coming true.
منابع مشابه
Improving End-user Security and Trustworthiness of TCG-Platforms
Over the last two years, the computing industry has started various initiatives to increase computer security be means of new hardware. The most notable effort is the Trusted Computing Group (TCG, former TCPA), which unites most important companies to develop a standard for security hardware. While efforts towards more security are generally appreciated, the new technology has raised fears that...
متن کاملExperimenting with TCPA/TCG Hardware, Or: How I Learned to Stop Worrying and Love The Bear
Over the last few years, our group has been working on applications of secure coprocessors—but has been frustrated by the limited computational environment and high expense of such devices. Over the last few years, the TCPA (now TCG) has produced a specification for a trusted platform module (TPM)—a small hardware addition intended to improve the overall security of a larger machine (and tied u...
متن کاملDRM, Trusted Computing and Operating System Architecture
Robust technological enforcement of DRM licenses assumes that the prevention of direct access to the raw bit representation of decrypted digital content and the license enforcement mechanisms themselves is possible. This is difficult to achieve on an open computing platform such as a PC. Recent trusted computing initiatives namely, the Trusted Computing Group (TCG) specification, and Microsoft’...
متن کاملDesign and Implementation of a TCG-based Integrity Measurement Architecture
We present the design and implementation of a secure integrity measurement system for Linux. All executable content that is loaded onto the Linux system is measured before execution and these measurements are protected by the Trusted Platform Module (TPM) that is part of the Trusted Computing Group (TCG) standards. Our system is the first to extend the TCG trust concepts to dynamic executable c...
متن کاملTowards an Economic Analysis of Trusted Systems
Trusted-platform initiatives such as Microsoft’s Next-Generation Secure-Computing Base (NGSCB) and the industry-wide Trusted-Computing Group (TCG) effort are the subject of significant research and development now. The goal of these initiatives is to change a fundamental fact about networked, general-purpose computers that is often viewed as a barrier to security: Once data are sent from one ma...
متن کامل