Continuous Tamper-proof Logging using TPM2.0. Arunesh Sinha 1 , Limin Jia 1 , Paul England 2 , Jacob R. Lorch 2 1 Carnegie Mellon University, 2 Microsoft Research, Redmond. Motivation. Butler Lampson says Auditing: Post-hoc inspection and punishment
Arunesh Sinha1, Limin Jia1, Paul England2, Jacob R. Lorch2
1Carnegie Mellon University, 2Microsoft Research, Redmond
Today computer security depends on access control, and it's been a failure. Real world security, by contrast, is mainly retroactive: the reason burglars don't break into my house is that they are afraid of going to jail, and the financial system is secure mainly because almost any transaction can be undone.
NV memory TPM