Implementation of a TCG-Based Trusted Computing in Mobile Device

نویسندگان

  • SuGil Choi
  • Jin-Hee Han
  • JeongWoo Lee
  • Jongpil Kim
  • Sungik Jun
چکیده

Our implementation is aimed at estimating the possibility of employing TCG-based trusted computing mechanisms, such as verifying the code-integrity of executables and libraries at load-time and remote attestation, in mobile devices. Considering the restrained resource in mobile device, the experimentation shows promising results, thereby enabling these mechanisms to be used as a basic building block for a more secured mobile service. To this end, we add a new feature of integrity measurement and verification to Wombat Linux kernel and Iguana embedded OS. We also implement attestation agents, Privacy CA, and TCG Software Stack.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment

With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...

متن کامل

µTSS - A Simplified Trusted Software Stack

The TCG Software Stack (TSS) specifies the software layer for application developers to use functions provided by a Trusted Platform Module (TPM). However, the current TSS interface is highly complex, which makes its usage very difficult and error-prone, and the high complexity makes it unsuitable for embedded devices or security kernels. We present a simplified TSS design and implementation (μ...

متن کامل

Virtualisation of a SIM-Card using trusted computing

The goal of this thesis is to examine, how subscriber authentication in mobile cellular networks could be implemented to the next generation of mobile phones and devices. In this context, we consider and evaluate several architectural directions and propose a novel solution of a software replacement for the Subscriber Identity Module (SIM) based on the TCG MPWG Reference Architecture. Therefor,...

متن کامل

A Mobile Trusted Platform Module (mTPM) Architecture

We present the architecture of a mobile Trusted Platform Module (mTPM). Current implementations of TPM architectures assume physical bindings between the TPM and a single hardware platform. In this paper we introduce an alternative where a TPM is bound to a single virtual machine (VM) on a portable device, following the specifications provided by the Trusted Computing Group (TCG). By communicat...

متن کامل

Trusted Mobile Devices: Requirements for a Mobile Trusted Platform Module

544 INTRODUCTION In recent years, mobile devices have replaced desktop PCs as the primary computing platform for many users. This trend is encouraged by convenient access to bank accounts, personal networks, and a wide range of networked resources through our tablets and mobile phones (see Fig. 1). Many organizations would like to use mobile devices in the work environment as a cost-savings and...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008