A Practical Guide to TPM 2.0 2015
DOI: 10.1007/978-1-4302-6584-9_12
|View full text |Cite
|
Sign up to set email alerts
|

Platform Configuration Registers

Abstract: Platform Configuration Registers (PCRs) are one of the essential features of a TPM. Their prime use case is to provide a method to cryptographically record (measure) software state: both the software running on a platform and configuration data used by that software. The PCR update calculation, called an extend, is a one-way hash so that measurements can't be removed. These PCRs can then be read to report their state. They can also be signed to return a more secure report, called an attestation (or quote). PCR… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…As previously mentioned, the methodology to secure the information contained in the MN involves periodically accessing PCRs in order to monitor the system's integrity. With this purpose, the MN keeps track of potential hardware changes taking place in the PCRs 0 to 7, as these ones can reveal any hardware configuration in the system [20].…”
Section: Proposed Methods To Secure Datamentioning
confidence: 99%
“…As previously mentioned, the methodology to secure the information contained in the MN involves periodically accessing PCRs in order to monitor the system's integrity. With this purpose, the MN keeps track of potential hardware changes taking place in the PCRs 0 to 7, as these ones can reveal any hardware configuration in the system [20].…”
Section: Proposed Methods To Secure Datamentioning
confidence: 99%
“…• Join. Agent establishes a connection with GM through (σ, K), and then T A sends the system environment hashs (similar to platform configuration register (PCR) [23]) signed by K to GM . GM verifies the integrity and issues group membership certificates for Agent and T A.…”
Section: B Certificate Migration Protocol Designmentioning
confidence: 99%
“…2 shows the architecture of a TPM2.0 device [45], where the different components are interconnected by a bus, which also connects to the I/O interface. In addition to the aforementioned TRNG and the nonvolatile memory, where the Platform Configuration Registers (PCR) [48] are located, there are other important modules such as the symmetric and asymmetric key engines and the key generation engine. Typically, TPMs are used in computing systems supporting a BIOS or a similar firmware in charge to boot the device for adding a security layer below the software.…”
Section: ) Trusted Platform Modulesmentioning
confidence: 99%
“…In this sense, the TPM provides a root of trust. In this scheme, PCRs are records containing a concatenation of hashes [48] which are the base of the different protection mechanisms performed by the TPM. As an example, during the secure boot process provided by modern BIOSes, the startup firmware checks different parameters of the system as the peripherals attached, the status of the memory, and others.…”
Section: ) Trusted Platform Modulesmentioning
confidence: 99%