Xen and the art of virtualization
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Linking remote attestation to secure tunnel endpoints
Proceedings of the first ACM workshop on Scalable trusted computing
vTPM: virtualizing the trusted platform module
USENIX-SS'06 Proceedings of the 15th conference on USENIX Security Symposium - Volume 15
Trustworthy and personalized computing on public kiosks
Proceedings of the 6th international conference on Mobile systems, applications, and services
Bootstrapping trust in a "trusted" platform
HOTSEC'08 Proceedings of the 3rd conference on Hot topics in security
CloRExPa: Cloud resilience via execution path analysis
Future Generation Computer Systems
Hi-index | 0.00 |
Use of trusted computing to achieve integrity guarantees remains limited due to the complexity of monitoring a large set of systems, the required changes to guest operating systems, and, e.g., relay attacks or time of measurement to time of reporting attacks. Datacenters with virtualization must scale to manage large numbers of virtual machines. We suggest an extension to virtualized trusted platform modules that significantly reduces the complexity of software attestation. It enables efficient event-based monitoring of a large number of virtual machines and eliminates attacks on the currently used attestation protocol. It targets patch and configuration management and audit. The virtual TPM extension requires only 700 lines of additional code. Our experiments confirm that this approach has very low performance overhead and is comparable to other resource monitoring tools.