In this paper we describe bugs and ways to attack trusted computing systems based on a static root of trust such as Microsoft’s Bitlocker. We propose to use the dy-namic root of trust feature of newer x86 processors as this shortens the trust chain, can minimize the Trusted Computing Base of applications and is less vulnerable to TPM and BIOS attacks. To support our claim we implemented the Open Secure LOader (OSLO), the first publicly available bootloader based on AMDs skinit instruction.
Soft errors in embedded systems' memories like single-event upsets and multiple-bit upsets lead to d...
The Trusted Computing Base (TCB) describes the part of an IT system that is responsible for enforcin...
Commodity monolithic systems are enormous, having lots of unprotection that leads to attacks. In thi...
In this paper we introduce basic knowledge of Trusted Com-puting briefly. And then, we describe atta...
In this paper, we present SobTrA, a Software-based Trust Anchor for ARM Cortex-A processors to prote...
Security controls (such as encryption endpoints, payment gateways, and firewalls) rely on correct pr...
The increasing need for security has caused system designers to consider placing some security suppo...
As the number of so-called Internet-of-Things is continuously rising and the urge for regular hardwa...
The electronics industry is incredibly fast-moving and has greatly impacted our society. One of its ...
peer-reviewedTrusted Computing is a relatively new approach to computer security in which a system s...
International audienceA variety of applications are executing on a large untrusted computing base, w...
Gateways play a vital role in the Internet of Things (IoT) infrastructure. Gateways are widely used ...
We discuss attack scenarios against the TPM-based boot process of BitLocker. Bit Locker is a disk vo...
In this paper we present the results of our research into security of the Intel ® Trusted Execution ...
Hardware-based trusted computing platforms are intended to overcome many of the problems of trust th...
Soft errors in embedded systems' memories like single-event upsets and multiple-bit upsets lead to d...
The Trusted Computing Base (TCB) describes the part of an IT system that is responsible for enforcin...
Commodity monolithic systems are enormous, having lots of unprotection that leads to attacks. In thi...
In this paper we introduce basic knowledge of Trusted Com-puting briefly. And then, we describe atta...
In this paper, we present SobTrA, a Software-based Trust Anchor for ARM Cortex-A processors to prote...
Security controls (such as encryption endpoints, payment gateways, and firewalls) rely on correct pr...
The increasing need for security has caused system designers to consider placing some security suppo...
As the number of so-called Internet-of-Things is continuously rising and the urge for regular hardwa...
The electronics industry is incredibly fast-moving and has greatly impacted our society. One of its ...
peer-reviewedTrusted Computing is a relatively new approach to computer security in which a system s...
International audienceA variety of applications are executing on a large untrusted computing base, w...
Gateways play a vital role in the Internet of Things (IoT) infrastructure. Gateways are widely used ...
We discuss attack scenarios against the TPM-based boot process of BitLocker. Bit Locker is a disk vo...
In this paper we present the results of our research into security of the Intel ® Trusted Execution ...
Hardware-based trusted computing platforms are intended to overcome many of the problems of trust th...
Soft errors in embedded systems' memories like single-event upsets and multiple-bit upsets lead to d...
The Trusted Computing Base (TCB) describes the part of an IT system that is responsible for enforcin...
Commodity monolithic systems are enormous, having lots of unprotection that leads to attacks. In thi...