A Software-Based Trusted Platform Module Emulator

  • Mario Strasser
  • Heiko Stamer
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4968)

Abstract

When developing and researching new trusted computing technologies, appropriate tools to investigate their behavior and to evaluate their performance are of paramount importance. In this paper, we present an efficient and portable TPM emulator for Unix. Our emulator enables not only the implementation of flexible and low-cost test-beds and simulators but, in addition, provides programmers of trusted systems with a powerful testing and debugging tool that can also be used for educational purposes. Thanks to its portability and interoperability, the TPM emulator runs on a variety of platforms and is compatible with the most relevant software packages and interfaces.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Aaraj, N., Raghunathan, A., Ravi, S., Jha, N.K.: Energy and Execution Time Analysis of a Software-Based Trusted Platform Module. In: Proceedings of the Conference on Design, Automation and Test in Europe (DATE 2007), pp. 1128–1133 (2007)Google Scholar
  2. 2.
    Anderson, M.J., Moffie, M., Dalton, C.I.: Towards Trustworthy Virtualisation Environments: Xen Library OS Security Service Infrastructure. Technical Report HPL-2007-69, HP Laboratories Bristol (April 2007)Google Scholar
  3. 3.
    Matt Bishop. Computer Security: Art and Science. Addison Wesley, Reading (2003)Google Scholar
  4. 4.
    Granlund, T., et al.: GNU Multiple Precision Arithmetic Library.Google Scholar
  5. 5.
    Challener, D., et al.: A Practical Guide to Trusted Computing. IBM Press (2007)Google Scholar
  6. 6.
    Mitchell, C., et al.: Trusted Computing. IET (2005)Google Scholar
  7. 7.
    Sadeghi, A.-R., Selhorst, M., Stüble, C., Wachsmann, C., Winandy, M.: TCG inside? A Note on TPM Specification Compliance. In: Proceedings of the 1st ACM Workshop on Scalable Trusted Computing (STC 2006), pp. 47–56 (2006)Google Scholar
  8. 8.
    Sarmenta, L.F.G., van Dijk, M., O’Donnell, C.W., Rhodes, J., Devadas, S.: Virtual monotonic counters and count-limited objects using a TPM without a trusted OS. In: Proceedings of the 1st ACM Workshop on Scalable Trusted Computing (STC 2006), pp. 27–42 (2006)Google Scholar
  9. 9.
    Strasser, M., et al.: Software-based TPM Emulator, http://tpm-emulator.berlios.de/
  10. 10.
    Trusted Computing Group. Architecture OverviewGoogle Scholar
  11. 11.
    Trusted Computing Group. TPM Software Stack (TSS) Specification, Version 1.2, https://www.trustedcomputinggroup.org/specs/TSS/
  12. 12.
    Trusted Computing Group. TPM Specification, Version 1.2, Revision 103, https://www.trustedcomputinggroup.org/specs/TPM.
  13. 13.
    TU Graz, IAIK. jTSS – Java TCG Software Stack, http://trustedjava.sourceforge.net/
  14. 14.
    Yoder, K., et al.: TrouSerS – Open-source TCG Software Stack, http://trousers.sourceforge.net/
  15. 15.
    Zimmermann, R.: IBM Direct Anonymous Attestation Tools – TPM Test Suite, http://www.zurich.ibm.com/security/daa/

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Mario Strasser
    • 1
  • Heiko Stamer
    • 2
  1. 1.ETH ZurichSwitzerland
  2. 2.Fachbereich Elektrotechnik/InformatikUniversität KasselKasselGermany

Personalised recommendations