Skip to main content

A Software-Based Trusted Platform Module Emulator

  • Conference paper
Trusted Computing - Challenges and Applications (Trust 2008)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4968))

Included in the following conference series:

Abstract

When developing and researching new trusted computing technologies, appropriate tools to investigate their behavior and to evaluate their performance are of paramount importance. In this paper, we present an efficient and portable TPM emulator for Unix. Our emulator enables not only the implementation of flexible and low-cost test-beds and simulators but, in addition, provides programmers of trusted systems with a powerful testing and debugging tool that can also be used for educational purposes. Thanks to its portability and interoperability, the TPM emulator runs on a variety of platforms and is compatible with the most relevant software packages and interfaces.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Aaraj, N., Raghunathan, A., Ravi, S., Jha, N.K.: Energy and Execution Time Analysis of a Software-Based Trusted Platform Module. In: Proceedings of the Conference on Design, Automation and Test in Europe (DATE 2007), pp. 1128–1133 (2007)

    Google Scholar 

  2. Anderson, M.J., Moffie, M., Dalton, C.I.: Towards Trustworthy Virtualisation Environments: Xen Library OS Security Service Infrastructure. Technical Report HPL-2007-69, HP Laboratories Bristol (April 2007)

    Google Scholar 

  3. Matt Bishop. Computer Security: Art and Science. Addison Wesley, Reading (2003)

    Google Scholar 

  4. Granlund, T., et al.: GNU Multiple Precision Arithmetic Library.

    Google Scholar 

  5. Challener, D., et al.: A Practical Guide to Trusted Computing. IBM Press (2007)

    Google Scholar 

  6. Mitchell, C., et al.: Trusted Computing. IET (2005)

    Google Scholar 

  7. Sadeghi, A.-R., Selhorst, M., Stüble, C., Wachsmann, C., Winandy, M.: TCG inside? A Note on TPM Specification Compliance. In: Proceedings of the 1st ACM Workshop on Scalable Trusted Computing (STC 2006), pp. 47–56 (2006)

    Google Scholar 

  8. Sarmenta, L.F.G., van Dijk, M., O’Donnell, C.W., Rhodes, J., Devadas, S.: Virtual monotonic counters and count-limited objects using a TPM without a trusted OS. In: Proceedings of the 1st ACM Workshop on Scalable Trusted Computing (STC 2006), pp. 27–42 (2006)

    Google Scholar 

  9. Strasser, M., et al.: Software-based TPM Emulator, http://tpm-emulator.berlios.de/

  10. Trusted Computing Group. Architecture Overview

    Google Scholar 

  11. Trusted Computing Group. TPM Software Stack (TSS) Specification, Version 1.2, https://www.trustedcomputinggroup.org/specs/TSS/

  12. Trusted Computing Group. TPM Specification, Version 1.2, Revision 103, https://www.trustedcomputinggroup.org/specs/TPM .

  13. TU Graz, IAIK. jTSS – Java TCG Software Stack, http://trustedjava.sourceforge.net/

  14. Yoder, K., et al.: TrouSerS – Open-source TCG Software Stack, http://trousers.sourceforge.net/

  15. Zimmermann, R.: IBM Direct Anonymous Attestation Tools – TPM Test Suite, http://www.zurich.ibm.com/security/daa/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Peter Lipp Ahmad-Reza Sadeghi Klaus-Michael Koch

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Strasser, M., Stamer, H. (2008). A Software-Based Trusted Platform Module Emulator. In: Lipp, P., Sadeghi, AR., Koch, KM. (eds) Trusted Computing - Challenges and Applications. Trust 2008. Lecture Notes in Computer Science, vol 4968. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-68979-9_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-68979-9_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-68978-2

  • Online ISBN: 978-3-540-68979-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics