Trusted%20Computing - PowerPoint PPT Presentation

About This Presentation
Title:

Trusted%20Computing

Description:

Trusted Computing Erica Burch Jesse Forrest – PowerPoint PPT presentation

Number of Views:99
Avg rating:3.0/5.0
Slides: 17
Provided by: Erica222
Learn more at: http://www.cs.fsu.edu
Category:

less

Transcript and Presenter's Notes

Title: Trusted%20Computing


1
Trusted Computing
  • Erica Burch
  • Jesse Forrest

2
What is Trusted Computing?
  • Refers to technology from the Trusted Computing
    Group (TCG) which allows for computers and
    servers to offer improved computer security and
    protection from computer viruses and the like.

3
Who is the Trusted Computing Group?
  • A controversial initiative led by
  • AMD
  • Hewlett-Packard
  • IBM
  • Intel
  • Microsoft
  • Sony
  • Sun Microsystems
  • https//www.trustedcomputinggroup.org/home

4
TC Basic System Concepts
  • CPU is identified using certificates
  • Encryption is performed in the hardware
  • Data can be signed with the machines
    identification
  • Data can be encrypted with the machines secret
    key

5
Proposals for 4 New Features
  • Secure I/O is verified using checksums
  • Malicious software injecting itself in this path
    can be identified
  • Cannot defend against a hardware based attack

6
Proposals for 4 New Features
  • 2. Memory curtaining has the hardware keep
    programs from reading or writing each others
    memory
  • Information is secure from an intruder with
    control over OS

7
Proposals for 4 New Features
  • 3. Sealed storage protects private information
    with encryption from a key derived from
    corresponding hardware and software
  • Data can only be read by the same combination of
    software and hardware
  • Protected against dictionary attacks

8
Proposals for 4 New Features
  • 4. Remote attestation allows changes to users
    computer to be detected
  • Hardware generates a certificate stating what
    software is currently running
  • Combined with public-key encryption to present
    certificate to remote party

9
Controversy
  • TC allows computer manufacturers and software
    authors to monitor and control what users may do
    with their computers
  • Users cant change software
  • Users do not control information they receive
  • Users do not control their data
  • Loss of Internet Anonymity
  • Proposed owner override for TC

10
Controversy Continued
  • There is no way to determine if the hardware has
    been properly implemented or if any backdoors
    have been added.
  • Cryptographic designs and algorithms may become
    obsolete which will mean that users will be
    forced into unwanted upgrades with high switching
    costs.
  • In the event of a hardware failure, there is no
    way to reclaim encrypted data which means vital
    information may be lost forever.

11
Computer SecurityThreat Models
  • Computer Security concerns the protection of
    information assets. For personal computers this
    means the protection of stored data and programs.
    Protection typically involves confidentiality,
    integrity, and availability.

12
Threat Models Scenario 1Traditional PC Threat
Model
  • The owner is trusted, has full control over the
    PC, and is recognized by a password or
    biometrics.
  • Adversary is an unauthorized user.

PC Owner
PC
Hacker
Trusted
Trusted
Not Trusted
13
Threat Models Scenario 2TC Threat Model
  • Similar to Personal Computers Mode, except that
    in this case the trust between the PC and its
    owner is broken. Only the PC is trusted.

PC Owner
PC
Hacker
Not Trusted
Trusted
Not Trusted
14
Threat Models Scenario 3Digital Forensic
Threat Model
  • Similar to TC model. However, The law
    enforcement agent is able to extract
    incriminating data stored on the computer.

PC Owner
PC
Law Enforcement
Not Trusted
Trusted
Trusted
15
Topics Discussed
  • What Trusted Computing (TC) is.
  • Who is the Trusted Computing Group (TCG).
  • The 5 Components to Make TC Work.
  • Proposals for 4 New Features in TC.
  • TC Controversy
  • The 3 threat models.

16
References
  • http//www.againsttcpa.com
  • https//www.trustedcomputinggroup.org/home
  • http//www.wikipedia.com
  • http//www.lafkon.net/tc/TC_MID.html
Write a Comment
User Comments (0)
About PowerShow.com