Practical Techniques for Operating System Attestation

  • Paul England
Conference paper

DOI: 10.1007/978-3-540-68979-9_1

Volume 4968 of the book series Lecture Notes in Computer Science (LNCS)
Cite this paper as:
England P. (2008) Practical Techniques for Operating System Attestation. In: Lipp P., Sadeghi AR., Koch KM. (eds) Trusted Computing - Challenges and Applications. Trust 2008. Lecture Notes in Computer Science, vol 4968. Springer, Berlin, Heidelberg

Abstract

This paper describes three practical techniques for authenticating the code and other execution state of an operating system using the services of the TPM and a hypervisor. The techniques trade off detailed reporting of the OS code and configuration with the manageability and comprehensibility of reported configurations. Such trade-offs are essential because of the complexity and diversity of modern general purpose operating systems makes simple code authentication schemes using code hashes or certificates infeasible.

Keywords

trusted computing attestation security distributed systems security models 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Paul England
    • 1
  1. 1.Microsoft Corporation