Sciweavers

Share
ATC
2007
Springer

An Approach to a Trustworthy System Architecture Using Virtualization

11 years 4 months ago
An Approach to a Trustworthy System Architecture Using Virtualization
We present a system architecture for trusted transactions in highly sensitive environments. This architecture takes advantage of techniques provided by the Trusted Computing Group (TCG) to attest the system state of the communication partners, to guarantee that the system is free of malware and that its software has not been tampered with. To achieve meaningful attestation, virtualization is used to establish several different execution environments. The attestation process is limited to a fragment of the software running on the platform, more specifically, to the part requesting access to sensitive data. The Trusted Platform Module (TPM) is virtualized, in order to make it accessible for an execution environment with a higher trust level.
Frederic Stumpf, Michael Benz, Martin Hermanowski,
Added 07 Jun 2010
Updated 07 Jun 2010
Type Conference
Year 2007
Where ATC
Authors Frederic Stumpf, Michael Benz, Martin Hermanowski, Claudia Eckert
Comments (0)
books