Advertisement

An Approach to a Trustworthy System Architecture Using Virtualization

  • Frederic Stumpf
  • Michael Benz
  • Martin Hermanowski
  • Claudia Eckert
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4610)

Abstract

We present a system architecture for trusted transactions in highly sensitive environments. This architecture takes advantage of techniques provided by the Trusted Computing Group (TCG) to attest the system state of the communication partners, to guarantee that the system is free of malware and that its software has not been tampered with. To achieve meaningful attestation, virtualization is used to establish several different execution environments. The attestation process is limited to a fragment of the software running on the platform, more specifically, to the part requesting access to sensitive data. The Trusted Platform Module (TPM) is virtualized, in order to make it accessible for an execution environment with a higher trust level.

Keywords

Virtual Machine Trust Third Party Trusted Platform Module Virtual Machine Monitor Operating System Principle 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Madnick, S.E., Donovan, J.J.: Application and Analysis of the Virtual Machine Approach to Information System Security and Isolation. In: Proceedings of the Workshop on Virtual Computer Systems, pp. 210–224. ACM Press, New York (1973)CrossRefGoogle Scholar
  2. 2.
    Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., Boneh, D.: Terra: A virtual machine-based platform for trusted computing. In: SOSP 2003: Proceedings of the nineteenth ACM Symposium on Operating Systems Principles, pp. 193–206. ACM Press, New York (2003)CrossRefGoogle Scholar
  3. 3.
    Trusted Computing Group: Trusted Platform Module (TPM) specifications. Technical report (2006), http://www.trustedcomputinggroup.org/specs/TPM
  4. 4.
    Brickell, E., Camenisch, J., Chen, L.: Direct Anonymous Attestation. In: CCS 2004: Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 132–145. ACM Press, New York (2004)CrossRefGoogle Scholar
  5. 5.
    Goldberg, R.P.: Survey of Virtual Machine Research. IEEE Computer 34–35 (1974)Google Scholar
  6. 6.
    Sailer, R., Zhang, X., Jaeger, T., Doorn, L.v.: Design and Implementation of a TCG-based Integrity Measurement Architecture. In: 13th USENIX Security Symposium, IBM T. J. Watson Research Center (2004)Google Scholar
  7. 7.
    Berger, S., Caceres, R., Goldman, K.A., Perez, R., Sailer, R., van Doorn, L.: vTPM: Virtualizing the Trusted Platform Module. In: 15th USENIX Sec. Symp. (2006)Google Scholar
  8. 8.
    Liedtke, J.: On Micro-Kernel Construction. In: SOSP 1995: Proceedings of the fifteenth ACM Symposium on Operating Systems Principles, pp. 237–250. ACM Press, New York (1995)CrossRefGoogle Scholar
  9. 9.
    Engler, D.R., Kaashoek, M.F.J., O’Toole, J.: Exokernel: An Operating System Architecture for Application-level Resource Management. In: SOSP 1995: Proceedings of the fifteenth ACM Symposium on Operating Systems Principles, pp. 251–266. ACM Press, New York (1995)CrossRefGoogle Scholar
  10. 10.
    European Multilaterally Secure Computing Base: Towards Trustworthy Systems with Open Standards and Trusted Computing (2006), http://www.emscb.de/
  11. 11.
    Karger, P.A., Zurko, M.E., Bonin, D.W., Mason, A.H., Kahn, C.E.: A Retrospective on the VAX VMM Security Kernel. IEEE Trans. Softw. Eng. 17 (1991)Google Scholar
  12. 12.
    Rosenblum, M., Garfinkel, T.: Virtual Machine Monitors: Current Technology and Future Trends. IEEE Computer 39–47 (2005)Google Scholar
  13. 13.
    Applied Data Security Group, University of Bochum: TrustedGRUB (2006), http://www.prosecco.rub.de/trusted_grub_details.html
  14. 14.
    Stumpf, F., Tafreschi, O., Röder, P., Eckert, C.: A Robust Integrity Reporting Protocol for Remote Attestation. In: Proceedings of the Second Workshop on Advances in Trusted Computing (WATC 2006 Fall) (2006)Google Scholar
  15. 15.
    Diffie, W., Hellman, M.: New Directions in Cryptography. IEEE Transactions on Information Theory IT-22, 644–654 (1976)CrossRefMathSciNetGoogle Scholar
  16. 16.
    Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Pratt, I., Warfield, A., Barham, P., Neugebauer, R.: Xen and the Art of Virtualization. In: Proceedings of the ACM Symposium on Operating Systems Principles (2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Frederic Stumpf
    • 1
  • Michael Benz
    • 1
  • Martin Hermanowski
    • 1
  • Claudia Eckert
    • 1
  1. 1.Department of Computer Science, Darmstadt University of Technology, DarmstadtGermany

Personalised recommendations