Enhancing trusted platform modules with hardware-based virtualization techniques

Frederic Stumpf, Claudia Eckert

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

44 Scopus citations

Abstract

We present the design of a trusted platform module (TPM) that supports hardware-based virtualization techniques. Our approach enables multiple virtual machines to use the complete power of a hardware TPM by providing for every virtual machine (VM) the illusion that it has its own hardware TPM. For this purpose, we introduce an additional privilege level that is only used by a virtual machine monitor to issue management commands, such as scheduling commands, to the TPM. Based on a TPM Control Structure, we can ensure that state information of a virtual machine's TPM cannot corrupt the TPM state of another VM. Our approach uses recent developments in the virtualization technology of processor architectures.

Original languageEnglish
Title of host publicationProceedings - 2nd Int. Conf. on Emerging Security Information, Sys. Technol., SECURWARE 2008, Includes DEPEND 2008
Subtitle of host publication1st Int. Workshop on Dependability and Security in Complex and Critical Inf. Sys.
Pages1-9
Number of pages9
DOIs
StatePublished - 2008
Externally publishedYes
Event2nd International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2008 - Cap Esterel, France
Duration: 25 Aug 200831 Aug 2008

Publication series

NameProceedings - 2nd Int. Conf. Emerging Security Inf., Systems and Technologies, SECURWARE 2008, Includes DEPEND 2008: 1st Int. Workshop on Dependability and Security in Complex and Critical Inf. Sys.

Conference

Conference2nd International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2008
Country/TerritoryFrance
CityCap Esterel
Period25/08/0831/08/08

Fingerprint

Dive into the research topics of 'Enhancing trusted platform modules with hardware-based virtualization techniques'. Together they form a unique fingerprint.

Cite this