Title | Performing Trusted Computing Actively Using Isolated Security Processor |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Jia, Xiaoqi, He, Yun, Wu, Xiyao, Sun, Huiqi |
Conference Name | Proceedings of the 1st Workshop on Security-Oriented Designs of Computer Architectures and Processors |
Publisher | ACM |
Conference Location | New York, NY, USA |
ISBN Number | 978-1-4503-5991-7 |
Keywords | active trusted computing model, BIOS Security, Human Behavior, Metrics, pubcrawl, Resiliency, Scalability, security-first architecture, Trusted Computing |
Abstract | Trusted computing is one of the main development trend in information security. However, there are still two limitations in existing trusted computing model. One is that the measurement process of the existing trusted computing model can be bypassed. Another is it lacks of effective runtime detection methods to protect the system, even the measurement process itself. In this paper, we introduce an active trusted model which can solve those two problems. Our active trusted computing model is comprised of two components: normal computation world and isolated security world. All the security tasks of active trusted computing model are assigned to the isolated security world. In this model, the static trusted measurement measures BIOS and operating system at the start-up of the computer system; and the dynamic trusted measurement measures the code segment, the data segment, and other critical structures actively and periodically at runtime. We have implemented a prototype of the active trusted computing model and done preliminary evaluation. Our experimental results show that this prototype can perform trusted computing on-the-fly effectively with an acceptable performance overhead. |
URL | http://doi.acm.org/10.1145/3267494.3267498 |
DOI | 10.1145/3267494.3267498 |
Citation Key | jia_performing_2018 |