Implementation of a TCG-Based Trusted Computing in Mobile Device
نویسندگان
چکیده
Our implementation is aimed at estimating the possibility of employing TCG-based trusted computing mechanisms, such as verifying the code-integrity of executables and libraries at load-time and remote attestation, in mobile devices. Considering the restrained resource in mobile device, the experimentation shows promising results, thereby enabling these mechanisms to be used as a basic building block for a more secured mobile service. To this end, we add a new feature of integrity measurement and verification to Wombat Linux kernel and Iguana embedded OS. We also implement attestation agents, Privacy CA, and TCG Software Stack.
منابع مشابه
A Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment
With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...
متن کاملµTSS - A Simplified Trusted Software Stack
The TCG Software Stack (TSS) specifies the software layer for application developers to use functions provided by a Trusted Platform Module (TPM). However, the current TSS interface is highly complex, which makes its usage very difficult and error-prone, and the high complexity makes it unsuitable for embedded devices or security kernels. We present a simplified TSS design and implementation (μ...
متن کاملVirtualisation of a SIM-Card using trusted computing
The goal of this thesis is to examine, how subscriber authentication in mobile cellular networks could be implemented to the next generation of mobile phones and devices. In this context, we consider and evaluate several architectural directions and propose a novel solution of a software replacement for the Subscriber Identity Module (SIM) based on the TCG MPWG Reference Architecture. Therefor,...
متن کاملA Mobile Trusted Platform Module (mTPM) Architecture
We present the architecture of a mobile Trusted Platform Module (mTPM). Current implementations of TPM architectures assume physical bindings between the TPM and a single hardware platform. In this paper we introduce an alternative where a TPM is bound to a single virtual machine (VM) on a portable device, following the specifications provided by the Trusted Computing Group (TCG). By communicat...
متن کاملTrusted Mobile Devices: Requirements for a Mobile Trusted Platform Module
544 INTRODUCTION In recent years, mobile devices have replaced desktop PCs as the primary computing platform for many users. This trend is encouraged by convenient access to bank accounts, personal networks, and a wide range of networked resources through our tablets and mobile phones (see Fig. 1). Many organizations would like to use mobile devices in the work environment as a cost-savings and...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008