Visible to the public Performing Trusted Computing Actively Using Isolated Security Processor

TitlePerforming Trusted Computing Actively Using Isolated Security Processor
Publication TypeConference Paper
Year of Publication2018
AuthorsJia, Xiaoqi, He, Yun, Wu, Xiyao, Sun, Huiqi
Conference NameProceedings of the 1st Workshop on Security-Oriented Designs of Computer Architectures and Processors
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-5991-7
Keywordsactive trusted computing model, BIOS Security, Human Behavior, Metrics, pubcrawl, Resiliency, Scalability, security-first architecture, Trusted Computing
AbstractTrusted computing is one of the main development trend in information security. However, there are still two limitations in existing trusted computing model. One is that the measurement process of the existing trusted computing model can be bypassed. Another is it lacks of effective runtime detection methods to protect the system, even the measurement process itself. In this paper, we introduce an active trusted model which can solve those two problems. Our active trusted computing model is comprised of two components: normal computation world and isolated security world. All the security tasks of active trusted computing model are assigned to the isolated security world. In this model, the static trusted measurement measures BIOS and operating system at the start-up of the computer system; and the dynamic trusted measurement measures the code segment, the data segment, and other critical structures actively and periodically at runtime. We have implemented a prototype of the active trusted computing model and done preliminary evaluation. Our experimental results show that this prototype can perform trusted computing on-the-fly effectively with an acceptable performance overhead.
URLhttp://doi.acm.org/10.1145/3267494.3267498
DOI10.1145/3267494.3267498
Citation Keyjia_performing_2018