Measuring the integrity of critical operating system components and securely storing these measurements in a hardware-protected Trusted Platform Module (TPM) is a well-known approach for improving system security. However, currently it is not possible to securely extend this approach to TPMs used in virtualized environments. In this paper, we show how to multiplex integrity measurements of arbitrarily many Virtual Machines (VMs) with just a single standard TPM. In contrast to existing approaches such as vTPM, our approach achieves a higher level of security since measurements will never be held in software but are fully hardware-protected by the TPM at all times. We establish an integrity-protected mapping between each measurement and its r...
We introduce a secure architecture called an attested me-ter for advanced metering that supports lar...
Abstract. We describe a concept of mutual remote attestation for two identically configured trusted ...
The integration of Trusted Computing technologies into vir-tualized computing environments enables t...
Today, virtualization technologies and hypervisors celebrate their rediscovery. Especially migration...
International audienceTPM remote attestation allows to verify the integrity of the boot sequence of ...
We present the design of a trusted platform module (TPM) that supports hardware-based virtualization...
In recent years, the rapid development of virtualization and container technology brings unprecedent...
This paper discusses the design of the Virtualization Integrity Measurement Monitor (VIMM) framework...
International audienceDeep attestation is a particular case of remote attestation, i.e., verifying t...
We propose a framework for the attestation of the integrity of a remote system that considers not on...
Kernel-level attacks or rootkits can compromise the security of an operating system by executing wit...
As the complexity of current software systems increases, we see a correlative increase in the number...
We present an attestation mechanism that enables a remote verifier to implicitly evaluate the trustw...
Abstract—The advent of cloud computing and inexpensive multi-core desktop architectures has led to t...
Post-Compromise Security (PCS) is a property of secure-channelestablishment schemes which limits the...
We introduce a secure architecture called an attested me-ter for advanced metering that supports lar...
Abstract. We describe a concept of mutual remote attestation for two identically configured trusted ...
The integration of Trusted Computing technologies into vir-tualized computing environments enables t...
Today, virtualization technologies and hypervisors celebrate their rediscovery. Especially migration...
International audienceTPM remote attestation allows to verify the integrity of the boot sequence of ...
We present the design of a trusted platform module (TPM) that supports hardware-based virtualization...
In recent years, the rapid development of virtualization and container technology brings unprecedent...
This paper discusses the design of the Virtualization Integrity Measurement Monitor (VIMM) framework...
International audienceDeep attestation is a particular case of remote attestation, i.e., verifying t...
We propose a framework for the attestation of the integrity of a remote system that considers not on...
Kernel-level attacks or rootkits can compromise the security of an operating system by executing wit...
As the complexity of current software systems increases, we see a correlative increase in the number...
We present an attestation mechanism that enables a remote verifier to implicitly evaluate the trustw...
Abstract—The advent of cloud computing and inexpensive multi-core desktop architectures has led to t...
Post-Compromise Security (PCS) is a property of secure-channelestablishment schemes which limits the...
We introduce a secure architecture called an attested me-ter for advanced metering that supports lar...
Abstract. We describe a concept of mutual remote attestation for two identically configured trusted ...
The integration of Trusted Computing technologies into vir-tualized computing environments enables t...