Emulating Trusted Platform Module 2.0 on Raspberry Pi 2

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Trusted Mobile Devices: Requirements for a Mobile Trusted Platform Module

544 INTRODUCTION In recent years, mobile devices have replaced desktop PCs as the primary computing platform for many users. This trend is encouraged by convenient access to bank accounts, personal networks, and a wide range of networked resources through our tablets and mobile phones (see Fig. 1). Many organizations would like to use mobile devices in the work environment as a cost-savings and...

متن کامل

A Software-Based Trusted Platform Module Emulator

When developing and researching new trusted computing technologies, appropriate tools to investigate their behavior and to evaluate their performance are of paramount importance. In this paper, we present an efficient and portable TPM emulator for Unix. Our emulator enables not only the implementation of flexible and low-cost test-beds and simulators but, in addition, provides programmers of tr...

متن کامل

vTPM: Virtualizing the Trusted Platform Module

We present the design and implementation of a system that enables trusted computing for an unlimited number of virtual machines on a single hardware platform. To this end, we virtualized the Trusted Platform Module (TPM). As a result, the TPM’s secure storage and cryptographic functions are available to operating systems and applications running in virtual machines. Our new facility supports hi...

متن کامل

Cloaking Malware with the Trusted Platform Module

The Trusted Platform Module (TPM) is commonly thought of as hardware that can increase platform security. However, it can also be used for malicious purposes. The TPM, along with other hardware, can implement a cloaked computation, whose memory state cannot be observed by any other software, including the operating system and hypervisor. We show that malware can use cloaked computations to hide...

متن کامل

Trusted Computing: The TCG Trusted Platform Module Specification

In recent years, the necessity, functionality and new possibilities of trusted computing, especially the new standard from the Trusted Computing group (TCG) have been a hot topic of discussion in many forums. Also a lot of fears and misgivings in special for the use in PC environments have been provoked. In the meantime this technology has come of age, initial standards have been agreed upon an...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Security, Privacy and Trust Management

سال: 2020

ISSN: 2319-4103

DOI: 10.5121/ijsptm.2020.9301