■Trusted Computing Security of closed,.pdf
文本预览下载声明
ECE750: Pervasive Computing
Final Project
Trustworthy Computing
Michael Jarrett (msj arret@uwaterloo.ca)
th
August 10 , 2004
1
Outline
■ What is Trusted omputing (T )
■ T Implementation
■ Uses of T
■ Pervasive omputing (P ) and T
■ My proj ect: a T PKI for P
2
What is Trusted Computing?
■ omputing that “can be trusted”.
(by whom?)
■ losed computing device: only known or
authorized software can run on platform.
eg. New game consoles, cell phones, secure
coprocessors.
■ Open computing device: can run any
arbitrary mix of software (and even
hardware!)
■ Trusted omputing: Security of closed,
flexibility of open. 3
Industry View of TC
■ Process isolation
Protect processes from each other and even
from the operating system.
■ Secure I/O
Get input from keyboard/mouse, and output
to graphics card securely.
■ Secure storage
Store data that cannot be tampered with or
read by any other program.
■ Attestation
Prove to other software that a program (and
the layers below it) are authentic.
4
What its Not
■ Secure boot: every stage of system
execution authenticates the next stage,
and will not run otherwise.
显示全部