trusted computing
Download
Skip this Video
Download Presentation
Trusted Computing

Loading in 2 Seconds...

play fullscreen
1 / 18

Trusted Computing - PowerPoint PPT Presentation


  • 703 Views
  • Uploaded on

Trusted Computing. Or How I Learned to Stop Worrying and Love the MPAA. Trusted Computing. Overview of TCP How it works Intel LaGrande Microsoft NGSCB (Palladium) Uses Issues. Trusted Computing Group. TCG formed by industry leaders Open standards for trustworthy computing

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Trusted Computing' - Mia_John


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
trusted computing

Trusted Computing

Or

How I Learned to Stop Worrying and Love the MPAA

trusted computing1
Trusted Computing
  • Overview of TCP
  • How it works
    • Intel LaGrande
    • Microsoft NGSCB (Palladium)
  • Uses
  • Issues
trusted computing group
Trusted Computing Group
  • TCG formed by industry leaders
  • Open standards for trustworthy computing
  • Provides hardware and software security to combat several type of threat
  • Moving towards PDAs, omnipresence
features of trusted computers
Features of Trusted Computers
  • For business
    • Licensing
    • DRM
  • For Users
    • Anti-hacker
    • Anti-virus
    • Backwards compatible
    • Can be turned off
lagrande
LaGrande
  • Intel’s hardware implementation
  • Based on Arbaugh’s secure bootstrap
  • Runs parallel to normal architecture
  • Uses hash values for modification detection
  • Operates in several different parts of chipset
lagrande secure bootstrap
LaGrande – Secure Bootstrap
  • Higher abstraction layers only as secure as lower
  • Trusted CPU, chipset, and boot ROM
  • Each layer verifies hash of next layer before execution
lagrande protected environment
LaGrande – Protected Environment
  • Built on top of secure bootstrap architecture
  • Instruction set extensions to create protected processor partition
  • Extensions to create protected software stack
  • Trusted platform module (TPM) verifies conditions
  • Changes to I/O controller, memory controller, graphics controller, and CPU
lagrande1
LaGrande
  • Separate execution space
  • Separate memory space
  • Secure mouse/keyboard
  • Secure graphics
ngscb
NGSCB
  • Software side of TC
  • Domain Manager aka Nexus
  • Sealed Storage
  • Remote Attestation
ngscb nexus
NGSCB – Nexus
  • Security kernel, authenticated on boot
  • Authenticates trusted programs
  • Application interface to TPM
  • Does not trust OS
ngscb sealed storage
NGSCB – Sealed Storage
  • Encrypts data on storage device
  • Key is not stored on storage device
  • Hash of creating program stored with file
  • TPM only decrypts for program that passes modification detection
  • Decrypted only with same TPM / same program
ngscb remote attestation
NGSCB - Remote Attestation
  • Communicate hashes of secure programs for remote verification of modification detection
  • Ensures that client software functions as intended
  • Kazaa vs. MPAA/RIAA
slide16
Uses
  • Remote banking, business-to-business e-commerce, and online auctioning
  • Corporate networking, document sharing
  • Cheat-proof gaming enforcement
  • Secure data storage
  • Personal privacy protection, data management, and record keeping
  • Shared computing and secure transactions
  • Secure home computing
  • Government agencies that require a high level of security and trust
  • Software license enforcement
  • Copyright enforcement
issues
Issues
  • GPL
  • Who is in control – owners, MS, or content providers?
  • Assumptions – hardware modifications possible
  • Censorship
references
References
  • Trusted Computing: Promise and Risk http://www.eff.org/Infra/trusted_computing/20031001_tc.php
  • http://www.microsoft.com/resources/ngscb
  • Ross Anderson’s site http://www.cl.cam.ac.uk/~rja14/
  • Anderson’s Patent
  • Arbaugh Paper
  • Inside Intel\'s Secretive \'LaGrande\' Project http://www.extremetech.com/print_article/0,3998,a=107418,00.asp
  • http://www.intel.com/technology/security/
  • http://www.microsoft.com/whdc/winhec/pres03.mspx
ad