[go: up one dir, main page]

Futral et al., 2013 - Google Patents

Fundamental principles of intel® txt

Futral et al., 2013

View HTML
Document ID
2927567322997414769
Author
Futral W
Greene J
Publication year
Publication venue
Intel® Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters

External Links

Snippet

The first step to more secure computing is improved hardware. So before we discuss how to use the technology, let's define what constitutes an Intel® TXT–capable platform and the underlying principles behind the technology. We will take a look at the unique components …
Continue reading at link.springer.com (HTML) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/572Secure firmware programming, e.g. of basic input output system [BIOS]
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode

Similar Documents

Publication Publication Date Title
Tomlinson Introduction to the TPM
US12105806B2 (en) Securing communications with security processors using platform keys
KR101662618B1 (en) Measuring platform components with a single trusted platform module
CN110199286B (en) Method and system for data sealing using a seal enclosure
EP2207121B1 (en) Protecting content on virtualized client platforms
Anati et al. Innovative technology for CPU based attestation and sealing
KR100930218B1 (en) Method, apparatus and processing system for providing a software-based security coprocessor
US10803175B2 (en) Device attestation through security hardened management agent
JP7695011B2 (en) Protecting commercial off-the-shelf program binaries from theft using hardware enclaves
US9405912B2 (en) Hardware rooted attestation
AU2011271088B2 (en) System and method for n-ary locality in a security co-processor
Futral et al. Intel Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters
US9015454B2 (en) Binding data to computers using cryptographic co-processor and machine-specific and platform-specific keys
CN107077560B (en) System for establishing ownership of secure workspace
Fuchs et al. Advanced remote firmware upgrades using TPM 2.0
Lee et al. Secure mobile device structure for trust IoT
Fernandez et al. A cluster of patterns for trusted computing
Song et al. Tz-ima: Supporting integrity measurement for applications with arm trustzone
Sisinni Verification of software integrity in distributed systems
Futral et al. Fundamental principles of intel® txt
Hao et al. Trusted block as a service: Towards sensitive applications on the cloud
Kelly Project Cerberus Security Architecture Overview Specification
Akram et al. An introduction to the trusted platform module and mobile trusted module
Manferdelli et al. The cloudproxy tao for trusted computing
WO2025086129A1 (en) Methods and mechanisms for unified remote attestation for confidential applications in the cloud