skip to main content
10.1145/1179474.1179487acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

TCG inside?: a note on TPM specification compliance

Published:03 November 2006Publication History

ABSTRACT

The Trusted Computing Group (TCG) has addressed a new generation of computing platforms employing both supplemental hardware and software with the primary goal to improve the security and the trustworthiness of future IT systems. The core component of the TCG proposal is the Trusted Platform Module (TPM) providing certain cryptographic functions. Many vendors currently equip their platforms with a TPM claiming to be TCG compliant. However, there is no feasible way for application developers and users of TPM-enabled systems to verify this compliance. In practice, manufacturers may exploit the flexibility that the specification itself provides, or they may deviate from it by inappropriate design that might lead to security vulnerabilities. Hence, it is crucial to have an independent means for testing the compliance as well as analyzing the security of different TPMs. In this paper, we aim at making the first steps towards fulfilling this requirement: We have developed a test strategy as well as a prototype test suite for TPM compliance testing. Although our test does not cover the complete TCG specification, our test results show that many TPM implementations do not meet the TCG specification and have bugs. Moreover, we discuss that non-compliance may have crucial impact on security, and point out the corresponding security problems in case of a widespread TPM.

References

  1. TrustedGRUB. http://www.prosec.rub.de/trusted_grub.html.Google ScholarGoogle Scholar
  2. Linux Device Driver for Infineon TPMs. http://www.prosec.rub.de/tpm/index.html, 2006.Google ScholarGoogle Scholar
  3. Atmel. AT97SC3201 --- The Atmel Trusted Platform Module. http://www.atmel.com/dyn/resources/prod_documents/doc5010.pdf, August 2004.Google ScholarGoogle Scholar
  4. Atmel. AT97SC3203 Advanced Information Summary. http://www.atmel.com/dyn/resources/prod_documents/5116s.pdf, July 2005.Google ScholarGoogle Scholar
  5. Atmel. AT97SC3203S for SMBus Protocol Summary. http://www.atmel.com/dyn/resources/prod_documents/5132s.pdf, August 2005.Google ScholarGoogle Scholar
  6. Atmel. Trusted Platform Module AT97SC3201 Summary. http://www.atmel.com/dyn/resources/prod_documents/2015s.pdf, June 2005.Google ScholarGoogle Scholar
  7. B. Beizer. Black Box Testing. John Wiley & Sons, 1995.Google ScholarGoogle Scholar
  8. Broadcom. Broadcom Revolutionizes LAN Communications by Introducing the World's First PCI Express Gigabit Ethernet Controllers for Server, Desktop and Mobile PCs. http://www.broadcom.com/press/release.php?id=461159, October 2003.Google ScholarGoogle Scholar
  9. Broadcom. BCM5752 Product Brief. http://www.broadcom.com/collateral/pb/5752-PB00-R.pdf, 2005.Google ScholarGoogle Scholar
  10. Broadcom. BCM5752M Product Brief. http://www.broadcom.com/collateral/pb/5752M-PB00-R.pdf, 2005.Google ScholarGoogle Scholar
  11. Broadcom. Broadcom Controllers Integrate TPM 1.2 enabling OEMs to Offer Hardware-Based Security as a Standard Feature on all PCs. http://www.broadcom.com/press/release.php?id=700509, 2005.Google ScholarGoogle Scholar
  12. T. S. Chow. Test design modeled by finite-state machines. IEEE Transactions on Software Engineering, 4(3):178--187, 1978.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. K. El-Fakih, N. Yevtushenko, and G. v. Bochmann. FSM-based incremental conformance testing methods. IEEE Transactions on Software Engineering, 3 (7):425--436, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Horst Görtz Institute for IT Security, Ruhr-University Bochum, Applied Data Security Group. Technical Report. http://www.prosec.rub.de/tpmcompliance.html, May 2006.Google ScholarGoogle Scholar
  15. Infineon Technologies AG. Product Brief --- TPM 1.2 Hardware. http://www.infineon.com/tpm, May 2005.Google ScholarGoogle Scholar
  16. D. Lee and M. Yannakakis. Principles and methods of testing finite state machines - A survey. In Proceedings of the IEEE, volume~84, pages 1090--1123, 1996.Google ScholarGoogle ScholarCross RefCross Ref
  17. L. Li, S. A. Szygenda, and M. A. Thornton. Combining simulation and formal verification for integrated circuit design validation. In Proceedings of the 9th World Multi-Conference on Systemics, Cybernetics and Informatics (WMSCI), pages 92--97, 2005.Google ScholarGoogle Scholar
  18. H.-M. Lin, C.-C. Yen, C.-H. Shih, and J.-Y. Jou. On Compliance-Test of On-Chip Bus for SOC. In Proceedings of the 2004 Asia and South Pacific Design Automation Conference (ASP-DAC'04). IEEE Press, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. National Semiconductor. Product Brief: PC8374T SafeKeeper Desktop TrustedI/O. http://www.winbond-usa.com/products/winbond_products/pdfs/APC/PC8374T.p df, August 2004.Google ScholarGoogle Scholar
  20. J. Ruiz, A. Vallejo, and J. Abella. IPv6 conformance and interoperability testing. In Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005). IEEE Press, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Data Brief: ST19WP18-TPM-A Trusted Platform Module. http://www.st.com/stonline/products/literature/bd/10926.pdf, 2004.Google ScholarGoogle Scholar
  22. Data Brief: ST19WP18-TPM-B Trusted Platform Module. http://www.st.com/stonline/products/literature/bd/10927.pdf, 2004.Google ScholarGoogle Scholar
  23. Data Brief: ST19WP18-TPM-C Trusted Platform Module. http://www.st.com/stonline/products/literature/bd/10928.pdf, 2004.Google ScholarGoogle Scholar
  24. Trusted Computing Group (TCG). TCPA Main Specification, Version~1.1b. https://www.trustedcomputinggroup.org/specs/TPM/TCPA_Main_TCG_Architecture_v1_1b.pdf, February 2002.Google ScholarGoogle Scholar
  25. Trusted Computing Group (TCG). TPM Main Specification, Version 1.2 Revision 94. https://www.trustedcomputinggroup.org/specs/TPM/, March 2006.Google ScholarGoogle Scholar

Index Terms

  1. TCG inside?: a note on TPM specification compliance

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        STC '06: Proceedings of the first ACM workshop on Scalable trusted computing
        November 2006
        66 pages
        ISBN:1595935487
        DOI:10.1145/1179474

        Copyright © 2006 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 3 November 2006

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        Overall Acceptance Rate17of31submissions,55%

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader