Establishing Chain of Trust in Reconfigurable Hardware

  • Authors:
  • Thomas Eisenbarth;Tim Guneysu;Christof Paar;Ahmad-Reza Sadeghi;Marko Wolf;Russell Tessier

  • Affiliations:
  • Horst Gortz Institute for IT Security, Germany;Horst Gortz Institute for IT Security, Germany;Horst Gortz Institute for IT Security, Germany;Horst Gortz Institute for IT Security, Germany;Horst Gortz Institute for IT Security, Germany;University of Massachusetts Amherst, USA

  • Venue:
  • FCCM '07 Proceedings of the 15th Annual IEEE Symposium on Field-Programmable Custom Computing Machines
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

Facing ubiquitous threats like computer viruses, trojans and theft of intellectual property, Trusted Computing (TC) is an emerging technology towards building trustworthy computing platforms. A recent initiative by the Trusted Computing Group (TCG) specifies the use of Trusted Platform Modules (TPM), currently implemented as dedicated, cost-effective crypto-chips mounted on the main board of computer systems. In this paper we propose implementations for TC functionalities based on more flexible and versatile approaches for reconfigurable and embedded architectures. Our approach allows for (i) a scalable design and update of TPM functionalities in embedded systems, (ii) the integration of the TPM hardware in the chain of trust to bind applications to the underlying TPM and the reconfigurable hardware, and (iii) the design of vendor independent TPMs.