An approach to a trustworthy system architecture using visualization

Frederic Stumpf, Michael Benz, Martin Hermanowski, Claudia Eckert

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

30 Scopus citations

Abstract

We present a system architecture for trusted transactions in highly sensitive environments. This architecture takes advantage of techniques provided by the Trusted Computing Group (TCG) to attest the system state of the communication partners, to guarantee that the system is free of malware and that its software has not been tampered with. To achieve meaningful attestation, virtualization is used to establish several different execution environments. The attestation process is limited to a fragment of the software running on the platform, more specifically, to the part requesting access to sensitive data. The Trusted Platform Module (TPM) is virtualized, in order to make it accessible for an execution environment with a higher trust level.

Original languageEnglish
Title of host publicationAutonomic and Trusted Computing - 4th International Conference, ATC 2007, Proceedings
PublisherSpringer Verlag
Pages191-202
Number of pages12
ISBN (Print)9783540735465
DOIs
StatePublished - 2007
Externally publishedYes
Event4th International Conference on Autonomic and Trusted Computing: Bringing Safe, Self-x and Organic Computing Systems into Reality, ATC 2007 - Hong Kong, China
Duration: 11 Jul 200713 Jul 2011

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4610 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference4th International Conference on Autonomic and Trusted Computing: Bringing Safe, Self-x and Organic Computing Systems into Reality, ATC 2007
Country/TerritoryChina
CityHong Kong
Period11/07/0713/07/11

Fingerprint

Dive into the research topics of 'An approach to a trustworthy system architecture using visualization'. Together they form a unique fingerprint.

Cite this