Abstract
Over the past years, many different approaches and concepts in order to increase computer security have been presented. One of the most promising of these concepts is Trusted Computing which offers various services and functionalities like reporting and verifying the integrity and the configuration of a platform (attestation). The idea of reporting a platform’s state and configuration to a challenger opens new and innovative ways of establishing trust relationships between entities. However, common applications are not aware of Trusted Computing facilities and are therefore not able to utilise Trusted Computing services at the moment. Hence, this article proposes an architecture that enables arbitrary applications to perform remote platform attestation, allowing them to establish trust based on their current configuration. The architecture’s components discussed in this article are also essential parts of the OpenTC proof-of-concept prototype. It demonstrates applications and techniques of the Trusted Computing Group’s proposed attestation mechanism in the area of personal electronic transactions.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and Implementation of a TCG-based Integrity Measurement Architecture. In: Proceedings of the 13th USENIX Security Symposium, pp. 223–238 (2004)
NTRU Cryptosystems, Inc. NTRU Core TCG Software Stack (CTSS) (2005), http://www.ntru.com/products/tcg_ss.htm
Stallman, R.: Can You Trust Your Computer (2007), http://www.gnu.org/philosophy/can-you-trust.html
Schneier, B.: Who Owns Your Computer (2007), http://www.schneier.com/blog/archives/2006/05/who_owns_your_c.html
Baek, K.-Y., Ingersoll, W., Rotondo, S.A.: OpenSolaris Project: Trusted Platform Module Support (2007), http://www.opensolaris.org/os/project/tpm/
Kay, R.L.: Trusted Computing is Real and it’s Here (2007), https://www.trustedcomputinggroup.org/news/Industry_Data/Endpoint_Technologies_Associates_TCG_report_Jan_29_2007.pdf
Sarmenta, L., Rhodes, J., Müller, T.: TPM/J Java-based API for the Trusted Platform Module (2007), http://projects.csail.mit.edu/tc/tpmj/
Microsoft Developer Network. TPM Base Services (2007), http://msdn2.microsoft.com/en-us/library/aa446796.aspx
TrouSerS - An Open-Source TCG Software Stack Implementation (2007), http://trousers.sourceforge.net/
Kinney, S.: Trusted Platform Module Basics: Using TPM in Embedded Systems. Elsevier, Burlington, MA, USA (2006)
Sadeghi, A.-R., Stüble, C.: Property-based Attestation for Computing Platforms: Caring about Policies, not Mechanisms. In: Proceedings of the New Security Paradigm Workshop (NSPW), pp. 67–77 (2004)
Haldar, V., Chandra, D., Franz, M.: Semantic Remote Attestation - Virtual Machine Directed Approach to Trusted Computing. In: Proceedings of the 3rd Virtual Machine Research and Technology Symposium, pp. 29–41 (2004)
International Telecommunication Union. Generation and registration of Universally Unique Identifiers (UUIDs) and their use as ASN.1 object identifier components. ITU-T X.667 (2004), http://www.itu.int/ITU-T/studygroups/com17/oid/X.667-E.pdf
Pirker, M., Winkler, T., Toegl, R.: Trusted Computing for the JavaTMPlatform (2007), http://trustedjava.sourceforge.net/
Trusted Computing Group. TCG Software Stack Specification, Version 1.2 Errata A (2007), https://www.trustedcomputinggroup.org/specs/TSS/
W3C. Simple Object Access Protocol (SOAP) 1.1, W3C Note (2000), http://www.w3.org/TR/2000/NOTE-SOAP-20000508/
Trusted Computing Group. TCG Infrastructure Specifications (2007), https://www.trustedcomputinggroup.org/specs/IWG
Trusted Computing Group (2007), https://www.trustedcomputinggroup.org
Selhost, M., Stüble, C.: TrustedGRUB, Version 1.1 (2007), http://sourceforge.net/projects/trustedgrub
Goldman, K., Perez, R., Sailer, R.: Linking remote attestation to secure tunnel endpoints. In: Proceedings of the first ACM workshop on Scalable Trusted Computing, pp. 21–24 (2006)
Stumpf, F., Tafreschi, O., Röder, P., Eckert, C.: A Robust Integrity Reporting Protocol for Remote Attestation. In: Second Workshop on Advances in Trusted Computing (WATC 2006 Fall) (2006)
Trusted Computing Group. Trusted Network Connect (TNC) Specifications (2007), https://www.trustedcomputinggroup.org/specs/TNC/
Trusted Computing Group. TCG Specification Architecture Overview, Revision 1.4 (2007), https://www.trustedcomputinggroup.org/groups/TCG_1_4_Architecture_Overview.pdf
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Dietrich, K., Pirker, M., Vejda, T., Toegl, R., Winkler, T., Lipp, P. (2008). A Practical Approach for Establishing Trust Relationships between Remote Platforms Using Trusted Computing. In: Barthe, G., Fournet, C. (eds) Trustworthy Global Computing. TGC 2007. Lecture Notes in Computer Science, vol 4912. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-78663-4_12
Download citation
DOI: https://doi.org/10.1007/978-3-540-78663-4_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-78662-7
Online ISBN: 978-3-540-78663-4
eBook Packages: Computer ScienceComputer Science (R0)