Today, virtualization technologies and hypervisors celebrate their rediscovery. Especially migration of virtual machines (VMs) between hardware platforms provides a useful and cost-effective means to manage complex IT infrastructures. A challenge in this context is the virtualization of hardware security modules like the Trusted Platform Module (TPM) since the intended purpose of TPMs is to securely link software and the underlying hardware. Existing solutions for TPM virtualization, however, have various shortcomings that hinder the deployment to a wide range of useful scenarios. In this paper, we address these shortcomings by presenting a flexible and privacy-preserving design of a virtual TPM that in contrast to existing solutions suppor...
Abstract. The concept of Trusted Computing (TC) promises a new approach to improve the security of c...
A central aspect for securing connected embedded systems are remote firmware upgrades to deal with v...
In the last years, it has emerged a market of virtual ap-pliances, i.e., virtual machine images spec...
We present the design of a trusted platform module (TPM) that supports hardware-based virtualization...
The integration of Trusted Computing technologies into vir-tualized computing environments enables t...
Measuring the integrity of critical operating system components and securely storing these measureme...
In view of some new security issues in the computing platform with virtualization technology, this p...
Abstract. Virtual Trusted Platform modules (TPMs) were proposed as a software-based alternative to t...
International audienceTPM remote attestation allows to verify the integrity of the boot sequence of ...
Over the past years, the computing industry has started var-ious initiatives announced to increase c...
In recent years, the rapid development of virtualization and container technology brings unprecedent...
The purpose of this study is to investigate the application of Virtualization Trusted Platform Modul...
The advances and adoption of Trusted Computing and hardware assisted virtualisation technologies in ...
Integrating system-level virtualization technology with Trusted Computing technology can significant...
MasterAs the embedded system is applied in various fields, the rate of use of smart devices such as ...
Abstract. The concept of Trusted Computing (TC) promises a new approach to improve the security of c...
A central aspect for securing connected embedded systems are remote firmware upgrades to deal with v...
In the last years, it has emerged a market of virtual ap-pliances, i.e., virtual machine images spec...
We present the design of a trusted platform module (TPM) that supports hardware-based virtualization...
The integration of Trusted Computing technologies into vir-tualized computing environments enables t...
Measuring the integrity of critical operating system components and securely storing these measureme...
In view of some new security issues in the computing platform with virtualization technology, this p...
Abstract. Virtual Trusted Platform modules (TPMs) were proposed as a software-based alternative to t...
International audienceTPM remote attestation allows to verify the integrity of the boot sequence of ...
Over the past years, the computing industry has started var-ious initiatives announced to increase c...
In recent years, the rapid development of virtualization and container technology brings unprecedent...
The purpose of this study is to investigate the application of Virtualization Trusted Platform Modul...
The advances and adoption of Trusted Computing and hardware assisted virtualisation technologies in ...
Integrating system-level virtualization technology with Trusted Computing technology can significant...
MasterAs the embedded system is applied in various fields, the rate of use of smart devices such as ...
Abstract. The concept of Trusted Computing (TC) promises a new approach to improve the security of c...
A central aspect for securing connected embedded systems are remote firmware upgrades to deal with v...
In the last years, it has emerged a market of virtual ap-pliances, i.e., virtual machine images spec...