Font Size: a A A

Design And Implementation Of Trusted Computing Software Stack In Embedded Platform

Posted on:2012-02-27Degree:MasterType:Thesis
Country:ChinaCandidate:Y Q SunFull Text:PDF
GTID:2178330335459848Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
With the rapid development of information technology, incidents that tamper with system security happen frequently and these problems are becoming more and more severe. Now, how to protect endpoint security has become the most important part of security researches and the Trusted Computing was born for this purpose. Trusted Computing commits itself to provide the platform of endpoint, on the basis of Trusted Platform Module (TPM), with trustworthy and reliable information storage and cryptography solution. It has been a hot topic in both theoretical and practical researches. However, current researches of Trusted Computing mainly concentrate on endpoints based on x86 architecture, like PC and servers. To some embedded systems which are tightly related to our lives like cell phone, they did not pay much attention. Since the increasing complexity of embedded systems, more and more malwares such as virus and torjan are likely to run on embedded platform therefore the research in such field is an urgent task.Therefore, we carried out the research on Trusted Computing Software Stack, hoping to establish a solid foundation for the usage of Trusted Computing in embedded environment as well as provide a convenient tool for the future development of security applications based on Trusted Computing.In this paper, we designed and implemented an Embedded Trusted Computing Software Stack which lies between upper-level applications and lower-level hardware TPM. It can provide upper-level applications with standard TSS interfaces and frequently-used TPM functions such as keys usage, bind and seal operations and so on. In addition, this software stack also integrated some TPM managements like key management and authorization protocols.Moreover, in order to test the software stack and demonstrate the usage of interfaces, this paper also worked on a test suit and an AP device integrity reporting scheme.
Keywords/Search Tags:trusted computing, software stack, key, authrozation
PDF Full Text Request
Related items