20th Annual Computer Security Applications Conference
DOI: 10.1109/csac.2004.25
|View full text |Cite
|
Sign up to set email alerts
|

Open-Source Applications of TCPA Hardware

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
40
0

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 60 publications
(40 citation statements)
references
References 13 publications
0
40
0
Order By: Relevance
“…Unlike the first task (e.g., [14,15,16]) and the third task (e.g., [17,18,19,20]), the second task has, until now, not been addressed in detail. Although protocols have been developed, those published are in the form of programming language-dependent and TPM library-dependent source code, without any security analysis.…”
Section: Related Workmentioning
confidence: 99%
“…Unlike the first task (e.g., [14,15,16]) and the third task (e.g., [17,18,19,20]), the second task has, until now, not been addressed in detail. Although protocols have been developed, those published are in the form of programming language-dependent and TPM library-dependent source code, without any security analysis.…”
Section: Related Workmentioning
confidence: 99%
“…For example, the superuser can use a debugger to read the memory location where the secret is loaded after it is released from the TPM. To solve this problem, Marchesini et al, in their later work [20] added Security Enhanced Linux (SELinux) to the Enforcer to provide software compartments to limit the superuser. SELinux [26,27] is a Flask-based operating system that offers mandatory role-based access control.…”
Section: Adding Selinuxmentioning
confidence: 99%
“…This project builds on our previous Enforcer Linux and SELinux projects [19,20,21], and uses the 1.1b TPM from the Trusted Computing Group (TCG) (formerly the Trusted Computing Platform Alliance, TCPA) [22,23].…”
Section: Our Solutionmentioning
confidence: 99%
“…Marchesini et al [15] use OS hardening to create "software compartments" which are isolated from each other and cannot be accessed by a "root spy". Based thereon, their design provides "compartmentalized attestation", i.e.…”
Section: Related Workmentioning
confidence: 99%