SlideShare una empresa de Scribd logo
1 de 21
Descargar para leer sin conexión
Trusted Computing
Agenda
 Why Trusted Computing
 The Trusted Computing Architecture
 Uses of Trusted Computing
 Issues with Trusted Computing
 Trusted Computing in practice
 Details: 3rd party attestation
Agenda
 Why Trusted Computing
 The Trusted Computing Architecture
 Uses of Trusted Computing
 Issues with Trusted Computing
 Trusted Computing in practice
 Details: 3rd party attestation
Trusted Computing
 Trust (RFC 4949):A feeling of certainty (sometimes
based on inconclusive evidence) either (a) that the
system will not fail or (b) that the system meets its
specifications (i.e., the system does what it claims to do
and does not perform unwanted functions)
 When approaching a PC, do we have this feeling?
Lack of Trust
 Mutability
– Data
– Applications and libraries
– Device drivers
– Kernel components
– And… the BIOS
 “Least privilege” principle is ignored
– Administrator privileges
 Huge amounts of trusted code
 Secure development principles are not applied
Trusted Computing Group
 [An] organization formed to develop, define, and
promote open standards for hardware-enabled
trusted computing and security technologies, including
hardware building blocks and software interfaces, across
multiple platforms, peripherals, and devices
 Implicitly: software alone will not do
 Established (as TCPA) 1999
 TPM 1.0 published Feb. 2001
 TNC work started 2004
 Around 200 member companies
 www.trustedcomputing.org
Agenda
 Why Trusted Computing
 The Trusted Computing Architecture
 Uses of Trusted Computing
 Issues with Trusted Computing
 Trusted Computing in practice
 Details: 3rd party attestation
Trusted Computing Architecture
TPM (Trusted Platform Module): a tamper-resistant hardware module
mounted in a platform.
Responsible for: measurement, storage, reporting and policy enforcement
Protected
Code
TPM
Boot Process
Operating System
App1 App2 App3
Encrypted
Files
Roots of Trust
 A Root ofTrust is a component that must behave as
expected, because its misbehavior cannot be detected
– A piece of code
 Root ofTrust for Measurement: the component that can
be trusted to reliably measure and report to the Root of Trust
for Reporting what software executes at the start of platform
boot
 Root ofTrust for Reporting: the component that can be
trusted to report reliable information about the platform
 Root ofTrust for Storage: the component that can be
trusted to securely store any quantity of information
A Chain of Trust (Illustrate with Possible
Attack Scenarios)
 The core idea of the Trusted Computing architecture
 Each stage measures and validates the next one
– Measurements go into Platform Configuration Registers
(PCRs) on theTPM
 The chain starts with the hardwareTPM
 Then software:
– RTM,TPM Software Stack, BIOS, kernel
– Applications?
 At the end, the entire platform is verified to be in a
trusted state
TC Cryptographic Capabilities
 SHA-1, HMAC
– Hashed message authentication code
 Physical random number generation
– An important feature in itself
 Asymmetric key generation
– 2048-bit RSA
 Asymmetric crypto encryption/decryption and signing
– RSA PKCS#1
 Bulk symmetric crypto is performed off-chip
– For example, disk encryption
 Reasons: price, export considerations
 This is no high performance crypto chip!
Agenda
 Why Trusted Computing
 The Trusted Computing Architecture
 Uses of Trusted Computing
 Issues with Trusted Computing
 Trusted Computing in practice
 Details: 3rd party attestation
Uses of Trusted Computing
 Data protection: storage of secrets
– TPM unseals storage keys only if the platform is in a trusted state
 Detecting unwanted changes to a machine’s configuration
– Secure boot
 The next three require “3rd party attestation”
– Protocol described later
 Checking client integrity on a local network
– E.g. before the client is allowed into the network
– Or by each network server
 Verifying the trustworthiness of a “kiosk”
– By a remote server
– By a local smartcard
 Machine authentication for remote access
Trusted Computing in Practice
 TPM exists on a very large percentage of desktops and
laptops
– On your computer, too
 But it is disabled by default
 So it is rarely used
– Even innocuous functionality like RNG is blocked!
 Microsoft was expected to enhance TC functionality inVista
– But only made a small step with BitLocker
– Better with Windows 7 and 8
 Apple used TPM once to ensure its new OS only runs on its
own “beta” machines
– But this is the wrong way around!
Agenda
 Why Trusted Computing
 The Trusted Computing Architecture
 Uses of Trusted Computing
 Issues with Trusted Computing
 Trusted Computing in practice
 Details: 3rd party attestation
Remote Attestation
 Three phases
 Measurement: machine to be attested must measure its
properties locally
 Attestation: transfer measurements from machine being
attested to remote machine
 Verification: remote machine examines measurements
transferred during attestation and decides whether they
are valid and acceptable
Linux Integrity Measurement
What is the Purpos of Nonce? (Important)
Linux Verification
Dynamic Root of Trust (During
Runtime)
 Special CPU instruction
 Reset PCRs
 First measurement made by hardware
 Check if correct and proceed in further measurements
 Otherwise DRT was modified and not safe to use
Used for run trustedVirtual Machine, since measuring
all of software during startup is impossible and the same
software can be attacked later
Summary
 Trusted Computing tries to solve one of the top
problems in today’s computing
 It builds a complex and interesting architecture, using
innovative hardware components
 The in-built conflict between proven security and privacy
has not been resolved, and maybe cannot be
 TC is making small steps forward, will it ever see
widespread use?

Más contenido relacionado

La actualidad más candente

Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with Splunk
Splunk
 

La actualidad más candente (20)

Futurex Secure Key Injection Solution
Futurex Secure Key Injection SolutionFuturex Secure Key Injection Solution
Futurex Secure Key Injection Solution
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
 
HSM (Hardware Security Module)
HSM (Hardware Security Module)HSM (Hardware Security Module)
HSM (Hardware Security Module)
 
Threat Intelligence
Threat IntelligenceThreat Intelligence
Threat Intelligence
 
MITRE ATT&CK Framework
MITRE ATT&CK FrameworkMITRE ATT&CK Framework
MITRE ATT&CK Framework
 
SIEM and Threat Hunting
SIEM and Threat HuntingSIEM and Threat Hunting
SIEM and Threat Hunting
 
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with Splunk
 
Cloud Security Architecture.pptx
Cloud Security Architecture.pptxCloud Security Architecture.pptx
Cloud Security Architecture.pptx
 
Vulnerability and Patch Management
Vulnerability and Patch ManagementVulnerability and Patch Management
Vulnerability and Patch Management
 
Threat Intelligence & Threat research Sources
Threat Intelligence & Threat research SourcesThreat Intelligence & Threat research Sources
Threat Intelligence & Threat research Sources
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 
ISO/IEC 27034 Application Security – How to trust, without paying too much!
ISO/IEC 27034 Application Security – How to trust, without paying too much!ISO/IEC 27034 Application Security – How to trust, without paying too much!
ISO/IEC 27034 Application Security – How to trust, without paying too much!
 
Memory forensics.pptx
Memory forensics.pptxMemory forensics.pptx
Memory forensics.pptx
 
Soc and siem and threat hunting
Soc and siem and threat huntingSoc and siem and threat hunting
Soc and siem and threat hunting
 
How MITRE ATT&CK helps security operations
How MITRE ATT&CK helps security operationsHow MITRE ATT&CK helps security operations
How MITRE ATT&CK helps security operations
 
SOAR and SIEM.pptx
SOAR and SIEM.pptxSOAR and SIEM.pptx
SOAR and SIEM.pptx
 
Ch 2: TCP/IP Concepts Review
Ch 2: TCP/IP Concepts ReviewCh 2: TCP/IP Concepts Review
Ch 2: TCP/IP Concepts Review
 
TARA- Automotive Cybersecurity.pptx
TARA- Automotive Cybersecurity.pptxTARA- Automotive Cybersecurity.pptx
TARA- Automotive Cybersecurity.pptx
 
Cyber kill chain
Cyber kill chainCyber kill chain
Cyber kill chain
 

Destacado

[Wroclaw #3] Trusted Computing
[Wroclaw #3] Trusted Computing[Wroclaw #3] Trusted Computing
[Wroclaw #3] Trusted Computing
OWASP
 

Destacado (11)

Txt Introduction
Txt IntroductionTxt Introduction
Txt Introduction
 
[Wroclaw #3] Trusted Computing
[Wroclaw #3] Trusted Computing[Wroclaw #3] Trusted Computing
[Wroclaw #3] Trusted Computing
 
Trusted computing introduction and technical overview
Trusted computing introduction and technical overviewTrusted computing introduction and technical overview
Trusted computing introduction and technical overview
 
Trusted Platform Module (TPM)
Trusted Platform Module (TPM)Trusted Platform Module (TPM)
Trusted Platform Module (TPM)
 
Abbie Barbir Tcg Final
Abbie Barbir Tcg FinalAbbie Barbir Tcg Final
Abbie Barbir Tcg Final
 
Introduction to Cryptography Part I
Introduction to Cryptography Part IIntroduction to Cryptography Part I
Introduction to Cryptography Part I
 
Introduction to Cryptography Parts II and III
Introduction to Cryptography Parts II and IIIIntroduction to Cryptography Parts II and III
Introduction to Cryptography Parts II and III
 
Cryptography cse,ru
Cryptography cse,ruCryptography cse,ru
Cryptography cse,ru
 
Testing on Android
Testing on AndroidTesting on Android
Testing on Android
 
Introduction to android testing
Introduction to android testingIntroduction to android testing
Introduction to android testing
 
Threat metrix全球共享数字身份情報
Threat metrix全球共享数字身份情報Threat metrix全球共享数字身份情報
Threat metrix全球共享数字身份情報
 

Similar a Introduction to Trusted Computing

Similar a Introduction to Trusted Computing (20)

trusted computing platform alliancee.ppt
trusted computing platform alliancee.ppttrusted computing platform alliancee.ppt
trusted computing platform alliancee.ppt
 
Trusted Computing security _platform.ppt
Trusted Computing security _platform.pptTrusted Computing security _platform.ppt
Trusted Computing security _platform.ppt
 
Trusted _Computing _security mobile .ppt
Trusted _Computing _security mobile .pptTrusted _Computing _security mobile .ppt
Trusted _Computing _security mobile .ppt
 
Trusted Computing _plate form_ model.ppt
Trusted Computing _plate form_ model.pptTrusted Computing _plate form_ model.ppt
Trusted Computing _plate form_ model.ppt
 
Why TPM in Automotive?
Why TPM in Automotive?Why TPM in Automotive?
Why TPM in Automotive?
 
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
 
Embedded system
Embedded systemEmbedded system
Embedded system
 
PLNOG15: Simplifying network deployment using Autonomic networking and Plug-a...
PLNOG15: Simplifying network deployment using Autonomic networking and Plug-a...PLNOG15: Simplifying network deployment using Autonomic networking and Plug-a...
PLNOG15: Simplifying network deployment using Autonomic networking and Plug-a...
 
Standardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-VStandardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-V
 
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEEBKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
 
Introduction of Trusted Network Connect (TNC)
Introduction of Trusted Network Connect (TNC)Introduction of Trusted Network Connect (TNC)
Introduction of Trusted Network Connect (TNC)
 
Secure IOT Gateway
Secure IOT GatewaySecure IOT Gateway
Secure IOT Gateway
 
EMULATING TRUSTED PLATFORM MODULE 2.0 ON RASPBERRY PI 2
EMULATING TRUSTED PLATFORM MODULE 2.0 ON RASPBERRY PI 2EMULATING TRUSTED PLATFORM MODULE 2.0 ON RASPBERRY PI 2
EMULATING TRUSTED PLATFORM MODULE 2.0 ON RASPBERRY PI 2
 
Paper sharing_Edge based intrusion detection for IOT devices
Paper sharing_Edge based intrusion detection for IOT devicesPaper sharing_Edge based intrusion detection for IOT devices
Paper sharing_Edge based intrusion detection for IOT devices
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
 
Smart Printing Technical Presentation
Smart Printing Technical PresentationSmart Printing Technical Presentation
Smart Printing Technical Presentation
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
 
TC and TPM.ppt
TC and TPM.pptTC and TPM.ppt
TC and TPM.ppt
 
Nt2580 Final Project Essay Examples
Nt2580 Final Project Essay ExamplesNt2580 Final Project Essay Examples
Nt2580 Final Project Essay Examples
 
Hardware_root_trust_x86.pptx
Hardware_root_trust_x86.pptxHardware_root_trust_x86.pptx
Hardware_root_trust_x86.pptx
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

Introduction to Trusted Computing

  • 2. Agenda  Why Trusted Computing  The Trusted Computing Architecture  Uses of Trusted Computing  Issues with Trusted Computing  Trusted Computing in practice  Details: 3rd party attestation
  • 3. Agenda  Why Trusted Computing  The Trusted Computing Architecture  Uses of Trusted Computing  Issues with Trusted Computing  Trusted Computing in practice  Details: 3rd party attestation
  • 4. Trusted Computing  Trust (RFC 4949):A feeling of certainty (sometimes based on inconclusive evidence) either (a) that the system will not fail or (b) that the system meets its specifications (i.e., the system does what it claims to do and does not perform unwanted functions)  When approaching a PC, do we have this feeling?
  • 5. Lack of Trust  Mutability – Data – Applications and libraries – Device drivers – Kernel components – And… the BIOS  “Least privilege” principle is ignored – Administrator privileges  Huge amounts of trusted code  Secure development principles are not applied
  • 6. Trusted Computing Group  [An] organization formed to develop, define, and promote open standards for hardware-enabled trusted computing and security technologies, including hardware building blocks and software interfaces, across multiple platforms, peripherals, and devices  Implicitly: software alone will not do  Established (as TCPA) 1999  TPM 1.0 published Feb. 2001  TNC work started 2004  Around 200 member companies  www.trustedcomputing.org
  • 7. Agenda  Why Trusted Computing  The Trusted Computing Architecture  Uses of Trusted Computing  Issues with Trusted Computing  Trusted Computing in practice  Details: 3rd party attestation
  • 8. Trusted Computing Architecture TPM (Trusted Platform Module): a tamper-resistant hardware module mounted in a platform. Responsible for: measurement, storage, reporting and policy enforcement Protected Code TPM Boot Process Operating System App1 App2 App3 Encrypted Files
  • 9. Roots of Trust  A Root ofTrust is a component that must behave as expected, because its misbehavior cannot be detected – A piece of code  Root ofTrust for Measurement: the component that can be trusted to reliably measure and report to the Root of Trust for Reporting what software executes at the start of platform boot  Root ofTrust for Reporting: the component that can be trusted to report reliable information about the platform  Root ofTrust for Storage: the component that can be trusted to securely store any quantity of information
  • 10. A Chain of Trust (Illustrate with Possible Attack Scenarios)  The core idea of the Trusted Computing architecture  Each stage measures and validates the next one – Measurements go into Platform Configuration Registers (PCRs) on theTPM  The chain starts with the hardwareTPM  Then software: – RTM,TPM Software Stack, BIOS, kernel – Applications?  At the end, the entire platform is verified to be in a trusted state
  • 11. TC Cryptographic Capabilities  SHA-1, HMAC – Hashed message authentication code  Physical random number generation – An important feature in itself  Asymmetric key generation – 2048-bit RSA  Asymmetric crypto encryption/decryption and signing – RSA PKCS#1  Bulk symmetric crypto is performed off-chip – For example, disk encryption  Reasons: price, export considerations  This is no high performance crypto chip!
  • 12. Agenda  Why Trusted Computing  The Trusted Computing Architecture  Uses of Trusted Computing  Issues with Trusted Computing  Trusted Computing in practice  Details: 3rd party attestation
  • 13. Uses of Trusted Computing  Data protection: storage of secrets – TPM unseals storage keys only if the platform is in a trusted state  Detecting unwanted changes to a machine’s configuration – Secure boot  The next three require “3rd party attestation” – Protocol described later  Checking client integrity on a local network – E.g. before the client is allowed into the network – Or by each network server  Verifying the trustworthiness of a “kiosk” – By a remote server – By a local smartcard  Machine authentication for remote access
  • 14. Trusted Computing in Practice  TPM exists on a very large percentage of desktops and laptops – On your computer, too  But it is disabled by default  So it is rarely used – Even innocuous functionality like RNG is blocked!  Microsoft was expected to enhance TC functionality inVista – But only made a small step with BitLocker – Better with Windows 7 and 8  Apple used TPM once to ensure its new OS only runs on its own “beta” machines – But this is the wrong way around!
  • 15. Agenda  Why Trusted Computing  The Trusted Computing Architecture  Uses of Trusted Computing  Issues with Trusted Computing  Trusted Computing in practice  Details: 3rd party attestation
  • 16. Remote Attestation  Three phases  Measurement: machine to be attested must measure its properties locally  Attestation: transfer measurements from machine being attested to remote machine  Verification: remote machine examines measurements transferred during attestation and decides whether they are valid and acceptable
  • 18. What is the Purpos of Nonce? (Important)
  • 20. Dynamic Root of Trust (During Runtime)  Special CPU instruction  Reset PCRs  First measurement made by hardware  Check if correct and proceed in further measurements  Otherwise DRT was modified and not safe to use Used for run trustedVirtual Machine, since measuring all of software during startup is impossible and the same software can be attacked later
  • 21. Summary  Trusted Computing tries to solve one of the top problems in today’s computing  It builds a complex and interesting architecture, using innovative hardware components  The in-built conflict between proven security and privacy has not been resolved, and maybe cannot be  TC is making small steps forward, will it ever see widespread use?