Over the past years, the computing industry has started var-ious initiatives announced to increase computer security by means of new hardware architectures. The most notable ef-fort is the Trusted Computing Group (TCG) and the Next-Generation Secure Computing Base (NGSCB). This tech-nology oers useful new functionalities as the possibility to verify the integrity of a platform (attestation) or binding quantities on a specic platform (sealing). In this paper, we point out the deciencies of the attestation and sealing functionalities proposed by the existing speci-cation of the TCG: we show that these mechanisms can be misused to discriminate certain platforms, i.e., their operat-ing systems and consequently the corresponding vendors. A parti...
Security controls (such as encryption endpoints, payment gateways, and firewalls) rely on correct pr...
Trusted Computing, as viewed by the Trusted Computing Group (TCG), promises to solve a num-ber of pr...
Abstract: One of the most important use-cases of Trusted Computing is Remote Attestation. It allows ...
Trusted computing attestation mechanism relies on hash measurements to realize remote party attestat...
Abstract. Binary attestation in trusted computing provides the ability to reason about the state of ...
Binary attestation in trusted computing provides the ability to reason about the state of a platform...
Binary attestation in trusted computing platforms provide the ability to reason about the state of a...
Abstract. Over the past years, many different approaches and con-cepts in order to increase computer...
As the complexity of current software systems increases, we see a correlative increase in the number...
Abstract. Over the past years, many different approaches and con-cepts in order to increase computer...
Remote attestation of computing platforms, using trusted hardware, guarantees the integrity, and by ...
As the complexity of current software systems increases, we see a correlative increase in the number...
Remote attestation of computing platforms, using trusted hardware, guarantees the integrity, and by ...
In recent years, the rapid development of virtualization and container technology brings unprecedent...
Abstract: Trust is an indispensable part of the computing environment, the validity of any transacti...
Security controls (such as encryption endpoints, payment gateways, and firewalls) rely on correct pr...
Trusted Computing, as viewed by the Trusted Computing Group (TCG), promises to solve a num-ber of pr...
Abstract: One of the most important use-cases of Trusted Computing is Remote Attestation. It allows ...
Trusted computing attestation mechanism relies on hash measurements to realize remote party attestat...
Abstract. Binary attestation in trusted computing provides the ability to reason about the state of ...
Binary attestation in trusted computing provides the ability to reason about the state of a platform...
Binary attestation in trusted computing platforms provide the ability to reason about the state of a...
Abstract. Over the past years, many different approaches and con-cepts in order to increase computer...
As the complexity of current software systems increases, we see a correlative increase in the number...
Abstract. Over the past years, many different approaches and con-cepts in order to increase computer...
Remote attestation of computing platforms, using trusted hardware, guarantees the integrity, and by ...
As the complexity of current software systems increases, we see a correlative increase in the number...
Remote attestation of computing platforms, using trusted hardware, guarantees the integrity, and by ...
In recent years, the rapid development of virtualization and container technology brings unprecedent...
Abstract: Trust is an indispensable part of the computing environment, the validity of any transacti...
Security controls (such as encryption endpoints, payment gateways, and firewalls) rely on correct pr...
Trusted Computing, as viewed by the Trusted Computing Group (TCG), promises to solve a num-ber of pr...
Abstract: One of the most important use-cases of Trusted Computing is Remote Attestation. It allows ...