AEGIS: architecture for tamper-evident and tamper-resistant processing
ICS '03 Proceedings of the 17th annual international conference on Supercomputing
Computer
Implementing an untrusted operating system on trusted hardware
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
PRIMA: policy-reduced integrity measurement architecture
Proceedings of the eleventh ACM symposium on Access control models and technologies
Reducing TCB complexity for security-sensitive applications: three case studies
Proceedings of the 1st ACM SIGOPS/EuroSys European Conference on Computer Systems 2006
Design and implementation of a TCG-based integrity measurement architecture
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Linux kernel integrity measurement using contextual inspection
Proceedings of the 2007 ACM workshop on Scalable trusted computing
Towards application security on untrusted operating systems
HOTSEC'08 Proceedings of the 3rd conference on Hot topics in security
Hi-index | 0.00 |
Building trusted computing systems has been continuous endeavors for a long time. However, an increasing amount of trust problems remain unsolved in real-world applications. One of the most important reasons is that insufficient applicable software is available to handle the situation. Although the TCG tries to help building trusted software with TSS, the TSS essentially only states how to use a TPM but not what kind of software to build with the TPM. This paper proposes an answer to the latter question. With considerations to the Chinese counterpart of a TPM, i.e. a TPCM, the paper argues that a Trusted Software Base (TSB) is significant to build trusted applications. It defines a TSB as the totality of trust support mechanisms for system software on a computing platform, which monitors trustworthiness of software on the platform. The concept of TSB is presented and the approaches to designing it are discussed.