文档详情

■Trusted Computing Security of closed,.pdf

发布:2017-05-26约1.46万字共27页下载文档
文本预览下载声明
ECE750: Pervasive Computing Final Project Trustworthy Computing Michael Jarrett (msj arret@uwaterloo.ca) th August 10 , 2004 1 Outline ■ What is Trusted omputing (T ) ■ T Implementation ■ Uses of T ■ Pervasive omputing (P ) and T ■ My proj ect: a T PKI for P 2 What is Trusted Computing? ■ omputing that “can be trusted”. (by whom?) ■ losed computing device: only known or authorized software can run on platform.  eg. New game consoles, cell phones, secure coprocessors. ■ Open computing device: can run any arbitrary mix of software (and even hardware!) ■ Trusted omputing: Security of closed, flexibility of open. 3 Industry View of TC ■ Process isolation  Protect processes from each other and even from the operating system. ■ Secure I/O  Get input from keyboard/mouse, and output to graphics card securely. ■ Secure storage  Store data that cannot be tampered with or read by any other program. ■ Attestation  Prove to other software that a program (and the layers below it) are authentic. 4 What its Not ■ Secure boot: every stage of system execution authenticates the next stage, and will not run otherwise.
显示全部
相似文档