Dynamic Root of Trust in Trusted Computing
نویسنده
چکیده
In this paper we introduce basic knowledge of Trusted Computing briefly. And then, we describe attack towards trusted computing system, and also discuss vulnerability of modern trusted computing system. We will exam two solutions, which can be named under using ’dynamic root of trust’, for these problems. Generally, it will change the ’old’ architecture of ’static root of trust’-based trusted computing system by leveraging new feature provided by new chips of AMD and Intel. We also summary these solutions with a discussion of their benefits and drawbacks compare with formal methods. Finally, for the drawbacks, we propose some methods to im-
منابع مشابه
OSLO: Improving the Security of Trusted Computing
In this paper we describe bugs and ways to attack trusted computing systems based on a static root of trust such as Microsoft’s Bitlocker. We propose to use the dynamic root of trust feature of newer x86 processors as this shortens the trust chain, can minimize the Trusted Computing Base of applications and is less vulnerable to TPM and BIOS attacks. To support our claim we implemented the Open...
متن کاملD Ynamic R Oot of T Rust and C Hallenges
Trusted Computing intends to make PC platform trustworthy so that a user can have level of trust when working with it. To build a level of trust TCG gave specification of TPM, as integral part of TCB, for providing root(s) of trust. Further TCG defined Dynamic Root of Trust Measurement in Trusted Computing systems in its specification as a technology for measured platform initialization while s...
متن کاملAutomated Verification of Dynamic Root of Trust Protocols
Automated verification of security protocols based on dynamic root of trust, typically relying on protected hardware such as TPM, involves several challenges that we address in this paper. We model the semantics of trusted computing platforms (including CPU, TPM, OS, and other essential components) and of associated protocols in a classical process calculus accepted by ProVerif. As part of the ...
متن کاملTrusted Integrity Measurement and Reporting for Virtualized Platforms
Verifiable trust is a desirable property for computing platforms. Current trusted computing systems developed by Trusted Computing Group (TCG) provide verifiable trust by taking immutable snapshots of the whole set of platform components. It is, however, difficult to use this technology directly in virtualized platforms because of complexity and dynamic changes of platform components. In this p...
متن کاملSingle Attestation Image for a Trusted and Scalable Grid
Traditionally, Grid users are forced to trust the Grid platforms, but the users are not always regarded as trustworthy. This trust asymmetry hinders the commercializing of Grid resources. Trusted Grid is proposed to tackle this challenge by leveraging Trusted Computing (TC). However, the TC relies on a microcontroller Trusted Platform Modules (TPM) which has limited computing power and is doome...
متن کامل