Practical Techniques for Operating System Attestation

  • Paul England
Conference paper

DOI: 10.1007/978-3-540-68979-9_1

Volume 4968 of the book series Lecture Notes in Computer Science (LNCS)
Cite this paper as:
England P. (2008) Practical Techniques for Operating System Attestation. In: Lipp P., Sadeghi AR., Koch KM. (eds) Trusted Computing - Challenges and Applications. Trust 2008. Lecture Notes in Computer Science, vol 4968. Springer, Berlin, Heidelberg


This paper describes three practical techniques for authenticating the code and other execution state of an operating system using the services of the TPM and a hypervisor. The techniques trade off detailed reporting of the OS code and configuration with the manageability and comprehensibility of reported configurations. Such trade-offs are essential because of the complexity and diversity of modern general purpose operating systems makes simple code authentication schemes using code hashes or certificates infeasible.


trusted computing attestation security distributed systems security models 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Paul England
    • 1
  1. 1.Microsoft Corporation