We present the design of a trusted platform module (TPM) that supports hardware-based virtualization techniques. Our approach enables multiple virtual machines to use the complete power of a hardware TPM by providing for every virtual machine (VM) the illusion that it has its own hardware TPM. For this purpose, we introduce an additional privilege level that is only used by a virtual machine monitor to issue management commands, such as scheduling commands, to the TPM. Based on a TPM Control Structure, we can ensure that state information of a virtual machine's TPM cannot corrupt the TPM state of another VM. Our approach uses recent developments in the virtualization technology of processor architectures
The business world is exhibiting a growing dependency on computer systems, their operations and th...
This paper presents the first results from the ongoing research project HASPOC, developing a high as...
peer-reviewedTrusted Computing is a relatively new approach to computer security in which a system s...
Today, virtualization technologies and hypervisors celebrate their rediscovery. Especially migration...
Abstract. Virtual Trusted Platform modules (TPMs) were proposed as a software-based alternative to t...
The advances and adoption of Trusted Computing and hardware assisted virtualisation technologies in ...
In view of some new security issues in the computing platform with virtualization technology, this p...
Abstract. The concept of Trusted Computing (TC) promises a new approach to improve the security of c...
Measuring the integrity of critical operating system components and securely storing these measureme...
Integrating system-level virtualization technology with Trusted Computing technology can significant...
The integration of Trusted Computing technologies into vir-tualized computing environments enables t...
Virtual Machine Monitors (VMMs), also called hypervisors,can be used to construct a trusted computin...
Kernel-level attacks or rootkits can compromise the security of an operating system by executing wit...
MasterAs the embedded system is applied in various fields, the rate of use of smart devices such as ...
The purpose of this study is to investigate the application of Virtualization Trusted Platform Modul...
The business world is exhibiting a growing dependency on computer systems, their operations and th...
This paper presents the first results from the ongoing research project HASPOC, developing a high as...
peer-reviewedTrusted Computing is a relatively new approach to computer security in which a system s...
Today, virtualization technologies and hypervisors celebrate their rediscovery. Especially migration...
Abstract. Virtual Trusted Platform modules (TPMs) were proposed as a software-based alternative to t...
The advances and adoption of Trusted Computing and hardware assisted virtualisation technologies in ...
In view of some new security issues in the computing platform with virtualization technology, this p...
Abstract. The concept of Trusted Computing (TC) promises a new approach to improve the security of c...
Measuring the integrity of critical operating system components and securely storing these measureme...
Integrating system-level virtualization technology with Trusted Computing technology can significant...
The integration of Trusted Computing technologies into vir-tualized computing environments enables t...
Virtual Machine Monitors (VMMs), also called hypervisors,can be used to construct a trusted computin...
Kernel-level attacks or rootkits can compromise the security of an operating system by executing wit...
MasterAs the embedded system is applied in various fields, the rate of use of smart devices such as ...
The purpose of this study is to investigate the application of Virtualization Trusted Platform Modul...
The business world is exhibiting a growing dependency on computer systems, their operations and th...
This paper presents the first results from the ongoing research project HASPOC, developing a high as...
peer-reviewedTrusted Computing is a relatively new approach to computer security in which a system s...