Practical Techniques for Operating System Attestation

  • Paul England
Conference paper

DOI: 10.1007/978-3-540-68979-9_1

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4968)
Cite this paper as:
England P. (2008) Practical Techniques for Operating System Attestation. In: Lipp P., Sadeghi AR., Koch KM. (eds) Trusted Computing - Challenges and Applications. Trust 2008. Lecture Notes in Computer Science, vol 4968. Springer, Berlin, Heidelberg


This paper describes three practical techniques for authenticating the code and other execution state of an operating system using the services of the TPM and a hypervisor. The techniques trade off detailed reporting of the OS code and configuration with the manageability and comprehensibility of reported configurations. Such trade-offs are essential because of the complexity and diversity of modern general purpose operating systems makes simple code authentication schemes using code hashes or certificates infeasible.


trusted computing attestation security distributed systems security models 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Paul England
    • 1
  1. 1.Microsoft Corporation 

Personalised recommendations