The advent of e-commerce, e-government, and the rapid expansion of world-wide connectivity demands end-user systems that adhere to well-defined security policies. In this context Trusted Computing (TC) aims at providing a framework and effective mechanisms that allow computing platforms and processes in a distributed IT system to gain assurance about each other’s integrity/trustworthiness. An industrial attempt towards realization of TC is the initiative of the Trusted Computing Group (TCG), an alliance of a large number of IT enterprises. The TCG has published a set of specifications for extending conventional computer architectures with a variety of security-related features and cryptographic mechanisms. The TCG approach has not only been subject of research but also public debates and concerns. Currently, several prominent academic and industrial research projects are investigating trustworthy IT systems based on TC, virtualization technology, and secure operating system design.

We highlight special aspects of Trusted Computing and present some current research and challenges. We believe that TC technology is indeed capable of enhancing the security of computer systems, and is another helpful means towards establishing trusted infrastructures. However, we also believe that it is not a universal remedy for all of the security problems we are currently facing in information societies.


Virtual Machine Trusted Platform Module Digital Right Management Trust Computing Security Architecture 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Alsaid, A., Mitchell, C.J.: Preventing Phishing Attacks using Trusted Computing Technology. In: INC (July 2006)Google Scholar
  2. 2.
    Anderson, R.J.: Security Engineering: A Guide to Building Dependable Distributed Systems, 1st edn. John Wiley & Sons, New York, USA (2001)Google Scholar
  3. 3.
    Anderson, R.J.: The TCPA/Palladium FAQ (2002),
  4. 4.
    Arbaugh, W.A., Farber, D.J., Smith, J.M.: A secure and reliable bootstrap architecture. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, IEEE Computer Society, Technical Committee on Security and Privacy, pp. 65–71. IEEE Computer Society Press, Los Alamitos (1997)Google Scholar
  5. 5.
    Asokan, N., Ekberg, J.-E., Sadeghi, A.-R., Stüble, C., Wolf, M.: Enabling fairer digital rights management with trusted computing. In: ISC (2007)Google Scholar
  6. 6.
    Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I., Warfield, A.: Xen and the art of virtualization. In: SOSP (2007)Google Scholar
  7. 7.
    Benzel, T.V., Irvine, C.E., Levin, T.E., Bhaskara, G., Nguyen, T.D., Clark, P.C.: Design principles for security. Technical Report NPS-CS-05-010, Naval Postgraduate School (September 2005)Google Scholar
  8. 8.
    Berger, S., Caceres, R., Goldman, K.A., Perez, R., Sailer, R., van Doorn, L.: vTPM: Virtualizing the Trusted Platform Module. In: Proceedings of the 15th USENIX Security Symposium, pp. 305–320. USENIX (August 2006)Google Scholar
  9. 9.
    Brickell, E., Camenisch, J., Chen, L.: Direct anonymous attestation. In: ACM-CCS (October 2004)Google Scholar
  10. 10.
    Cabuk, S., Chris, H.R., Dalton, I., Schunter, M.: Towards automated provisioning of secure virtualized networks. In: ACM-CCS (2007)Google Scholar
  11. 11.
    Carroll, A., Juarez, M., Polk, J., Leininger, T.: Microsoft ”Palladium”: A business overview. Technical report, Microsoft Content Security Business Unit (August 2002)Google Scholar
  12. 12.
    Chen, L., Landfermann, R., Löhr, H., Rohe, M., Sadeghi, A.-R., Stüble, C.: A protocol for property-based attestation. In: ACM-STC, ACM Press, New York (2006)Google Scholar
  13. 13.
    Common Criteria Project Sponsoring Organisations. Common criteria for information technology security evaluation. Norm Version 2.1, CCIMB-99-031 – 33, Common Criteria Project Sponsoring Organisations (August 1999),
  14. 14.
    Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.1, RFC4346 (April 2006),
  15. 15.
    Dyer, J., Lindemann, M., Perez, R., Sailer, R., van Doorn, L., Smith, S.W., Weingart, S.: Building the IBM 4758 Secure Coprocessor. IEEEC 34(10), 57–66 (2001)Google Scholar
  16. 16.
    Felten, E.W.: Understanding Trusted Computing — Will Its Benefits Outweigh Its Drawbacks? IEEE Security and Privacy, 60–62 (May/June 2003)Google Scholar
  17. 17.
    Figueiredo, R., Dinda, P.A., Fortes, J.: Resource virtualization renaissance. IEEE Computer 38, 28–31 (2005)Google Scholar
  18. 18.
    Foundation, F.S.: GNU General Public License, Version 3,
  19. 19.
    Gajek, S., Sadeghi, A.-R., Stüble, C., Winandy, M.: Compartmented security for browsers — or how to thwart a phisher with trusted computing. In: ARES (2007)Google Scholar
  20. 20.
    Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., Boneh, D.: Terra: a virtual machine-based platform for trusted computing. In: SOSP, pp. 193–206. ACM, New York (2003)CrossRefGoogle Scholar
  21. 21.
    Gasmi, Y., Sadeghi, A.-R., Stewin, P., Unger, M., Asokan, N.: Beyond secure channels. In: ACM-STC (2007)Google Scholar
  22. 22.
    Goldberg, R.P.: Architectural Principles for Virtual Computer Systems. PhD thesis, Harvard University (1972)Google Scholar
  23. 23.
    Gürgens, S., Rudolph, C., Scheuermann, D., Atts, M., Plaga, R.: Security evaluation of scenarios based on the TCG TPM specification. In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 438–453. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  24. 24.
    Haldar, V., Chandra, D., Franz, M.: Semantic remote attestation: A virtual machine directed approach to trusted computing. In: USENIX Virtual Machine Research and Technology Symposium May 2004, Also Technical Report No. 03-20, School of Information and Computer Science, University of California, Irvine (October 2003)Google Scholar
  25. 25.
    Kent, S., Atkinson, R.: Security Architecture for the Internet Protocol, RFC2401 (November 1998),
  26. 26.
    Kühn, U., Kursawe, K., Lucks, S., Sadeghi, A.-R., Stüble, C.: Secure data management in trusted computing. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, Springer, Heidelberg (2005)CrossRefGoogle Scholar
  27. 27.
    Kühn, U., Selhorst, M., Stüble, C.: Property-Based Attestation and Sealing with Commonly Available Hard- and Software. In: ACM-STC (2007)Google Scholar
  28. 28.
    Kursawe, K., Schellekens, D., Preneel, B.: Analyzing Trusted Platform Communication. In: ECRYPT-CRASH (2005)Google Scholar
  29. 29.
    Liedtke, J.: Towards real micro-kernels. Commun. ACM 39(9) (1996)Google Scholar
  30. 30.
    Löhr, H., Ramasamy, H.G.V., Schulz, S., Schunter, M., Stüble, C.: Enhancing Grid Security Using Trusted Virtualization. In: ATC (2007)Google Scholar
  31. 31.
    MacDonald, R., Smith, S., Marchesini, J., Wild, O.: Bear: An open-source virtual secure coprocessor based on TCPA. Technical Report TR2003-471, Department of Computer Science, Dartmouth College (2003)Google Scholar
  32. 32.
    Mao, W., Jin, H., Martin, A.: Innovations for Grid Security from Trusted Computing,
  33. 33.
    Marchesini, J., Smith, S., Wild, O., Barsamian, A., Stabiner, J.: Open-source applications of TCPA hardware. In: ACSAC, ACM, New York (2004)Google Scholar
  34. 34.
    Marchesini, J., Smith, S.W., Wild, O., MacDonald, R.: Experimenting with TCPA/TCG hardware, or: How I learned to stop worrying and love the bear. Technical Report TR2003-476, Department of Computer Science, Dartmouth College (2003)Google Scholar
  35. 35.
    Mundie, C., de Vries, P., Haynes, P., Corwine, M.: Microsoft whitepaper on trustworthy computing. Technical report, Microsoft Corporation (October 2002)Google Scholar
  36. 36.
    Oppliger, R., Rytz, R.: Does trusted computing remedy computer security problems? IEEE Security & Privacy 3(2), 16–19 (2005)CrossRefGoogle Scholar
  37. 37.
    Pfitzmann, B., Riordan, J., Stüble, C., Waidner, M., Weber, A.: The PERSEUS system architecture. Technical Report RZ 3335 (#93381), IBM Research Division, Zurich Laboratory (April 2001)Google Scholar
  38. 38.
    Poritz, J., Schunter, M., Van Herreweghen, E., Waidner, M.: Property attestation—scalable and privacy-friendly security assessment of peer computers. Technical Report RZ 3548, IBM Research (May 2004)Google Scholar
  39. 39.
    Rozas, C.: Intel’s Security Vision for Xen (April 2005),
  40. 40.
    Sadeghi, A.-R., Selhorst, M., Christian Stüble, C., Wachsmann, Winandy, M.: TCG Inside? — A Note on TPM Specification Compliance. In: ACM-STC (2006)Google Scholar
  41. 41.
    Sadeghi, A.-R., Stüble, C.: Property-based attestation for computing platforms: Caring about properties, not mechanisms. In: ACM SIGSAC, The 2004 New Security Paradigms Workshop, ACM Press, New York (2004)Google Scholar
  42. 42.
    Safford, D.: The need for TCPA. IBM Research (October 2002)Google Scholar
  43. 43.
    Sailer, R., Jaeger, T., Valdez, E., Caceres, R., Perez, R., Berger, S., Griffin, J.L., van Doorn, L.: Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor (2005)Google Scholar
  44. 44.
    Sailer, R., Valdez, E., Jaeger, T., Perez, R., van Doorn, L., Griffin, J.L., Berger, S.: sHype: Secure hypervisor approach to trusted virtualized systems. Technical Report RC23511, IBM Research Division (February 2005)Google Scholar
  45. 45.
    Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and implementation of a TCG-based integrity measurement architecture. Research Report RC23064, IBM Research (January 2004)Google Scholar
  46. 46.
    Sarmenta, L.F.G., van Dijk, M., O’Donnell, C.W., Rhodes, J., Devadas, S.: Virtual monotonic counters and count-limited objects using a tpm without a trusted os. In: ACM-STC, pp. 27–42 (2006)Google Scholar
  47. 47.
    Schoen, S.: Palladium details (2002),
  48. 48.
    Smith, M., Friese, T., Engel, M., Freisleben, B.: Countering Security Threats in Service-Oriented On-Demand Grid Computing Using Sandboxing and Trusted Computing Techniques. Journal of Parallel and Distributed Computing (2006)Google Scholar
  49. 49.
    Smith, S.W.: Outbound authentication for programmable secure coprocessors. In: Gollmann, D., Karjoth, G., Waidner, M. (eds.) ESORICS 2002. LNCS, vol. 2502, pp. 72–89. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  50. 50.
    Spafford, G.: Risks Digest 19.37 (September 1997),
  51. 51.
    Trusted Computing Group,
  52. 52.
    Trusted Computing Group. TCG Architecture Overview (April 2004)Google Scholar
  53. 53.
    Trusted Computing Group. TPM main specification. Main Specification Version 1.2 rev. 85, Trusted Computing Group (February 2005)Google Scholar
  54. 54.
    Trusted Computing Group (TCG). About the TCG,
  55. 55.
    Trusted Computing Group (TCG). TCG Mobile Reference Architecture, Specification version 1.0, Revision 1 (June 12, 2007)Google Scholar
  56. 56.
    Trusted Computing Group (TCG). TCG Mobile Trusted Module Specification, version 1.0, Revision 1 (June 12, 2007)Google Scholar
  57. 57.
    Trusted Computing Platform Alliance (TCPA). Main specification, Version 1.1b (February 2002)Google Scholar
  58. 58.
    Yee, B.S.: Using Secure Coprocessors. PhD thesis, School of Computer Science, Carnegie Mellon University, CMU-CS-94-149 (May 1994)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Ahmad-Reza Sadeghi
    • 1
  1. 1.Horst Görtz Institute for IT SecurityRuhr-University BochumGermany

Personalised recommendations