It is amazing how accustomed we have grown to the ubiquitous threats in our every day computing lives. By now the design flaws in hardware components, as well as software applications and operating systems, are well known and can easily be exploited if an injection vector is found. Furthermore, there is a movement in the embedded sector to shift away from proprietary software and hardware components to the well-established ×86 architecture and to employ commonly used operating systems such as Windows or Linux. In addition attacks against IT systems are becoming more sophisticated and pure software-based solutions cannot guarantee lifetime integrity anymore. To improve on this situation, it is necessary to anchor additional hardware-based security modules as an integral part of a platform. Today's systems have a requirement for a high level of dependability, offering both safety and security features. In this paper we propose an efficient hardware-based security architecture utilizing Trusted Computing (TC) techniques based on trustworthy building blocks. A key focus of the work is the development of a hypervisor-based security architecture which utilizes a state-of-the-art hardware trust anchor to increase the security and trustworthiness of commonly used operating systems in the embedded ×86 sector.
[1]
Andrew Warfield,et al.
Xen and the art of virtualization
,
2003,
SOSP '03.
[2]
Calton Pu,et al.
Buffer overflows: attacks and defenses for the vulnerability of the decade
,
2000,
Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[3]
Shi Wenchang.
Implementing operating system support for extended trusted path in TPM-capable environments
,
2008,
Wuhan University Journal of Natural Sciences.
[4]
Scott A. Rotondo.
Trusted Computing Group
,
2011,
Encyclopedia of Cryptography and Security.
[5]
Martin Schramm,et al.
The benefits of combining trusted computing with virtualization techniques
,
2010,
2010 International Conference on Applied Electronics.
[6]
Roger R. Dube.
Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
,
2008
.
[7]
Peter G. Neumann,et al.
Security by obscurity
,
2003,
CACM.
[8]
David Grawrock.
Dynamics of a trusted platform: a building block approach
,
2009
.