Trusted computing platforms

Titel: Trusted computing platforms : design and applications / Sean W. Smith
Verfasser:
Veröffentlicht: Boston : Springer Science + Business Media, 2005
Umfang: XX, 244 S.
Format: E-Book
Sprache: Englisch
RVK-Notation:
Schlagworte:
Vorliegende Ausgabe: Online-Ausg.: 2005. - Online-Ressource.
ISBN: 0387239170 (Sekundärausgabe) ; 9780387239170 (Sekundärausgabe)
  • 1
  • Introduction
  • 1.1
  • Trust and Computing
  • 1.2
  • Instantiations
  • 1.3
  • Design and Applications
  • 1.4
  • Progression
  • 2
  • Motivating Scenarios
  • 2.1
  • Properties
  • 2.2
  • Basic Usage
  • 2.3
  • Examples of Basic Usage
  • 2.4
  • Position and Interest
  • 2.5
  • Examples of Positioning
  • 2.6
  • The Idealogical Debate
  • 2.7
  • Further Reading
  • 3
  • Attacks
  • 3.1
  • Physical Attacks
  • 3.2
  • Software Attacks
  • 3.3
  • Side-channel Analysis
  • 3.4
  • Undocumented Functionality
  • 3.5
  • Erasing Data
  • 3.6
  • System Context
  • 3.7
  • Defensive Strategy
  • 3.8
  • Further Reading
  • 4
  • Foundations
  • 4.1
  • Applications and Integration
  • 4.2
  • Architectures
  • 4.3
  • Booting
  • 4.4
  • The Defense Community
  • 4.5
  • Further Reading
  • 5
  • Design Challenges
  • 5.1
  • Context
  • 5.2
  • Obstacles
  • 5.3
  • Requirements
  • 5.4
  • Technology Decisions
  • 5.5
  • Further Reading
  • 6
  • Platform Architecture
  • 6.1
  • Overview
  • 6.2
  • Erasing Secrets
  • 6.3
  • The Source of Secrets
  • 6.4
  • Software Threats
  • 6.5
  • Code Integrity
  • 6.6
  • Code Loading
  • 6.7
  • Putting it All Together
  • 6.8
  • What's Next
  • 6.9
  • Further Reading
  • 7
  • Outbound Authentication
  • 7.1
  • Problem
  • 7.2
  • Theory
  • 7.3
  • Design and Implementation
  • 7.4
  • Further Reading
  • 8
  • Validation
  • 8.1
  • The Validation Process
  • 8.2
  • Validation Strategy
  • 8.3
  • Formalizing Security Properties
  • 8.4
  • Formal Verification
  • 8.5
  • Other Validation Tasks
  • 8.6
  • Reflection
  • 8.7
  • Further Reading
  • 9
  • Application Case Studies
  • 9.1
  • Basic Building Blocks
  • 9.2
  • Hardened Web Servers
  • 9.3
  • Rights Management for Big Brother's Computer
  • 9.4
  • Private Information
  • 9.5
  • Other Projects
  • 9.6
  • Lessons Learned
  • 9.7
  • Further Reading
  • 10
  • TCPA/TCG
  • 10.1
  • Basic Structure
  • 10.2
  • Outbound Authentication
  • 10.3
  • Physical Attacks
  • 10.4
  • Applications
  • 10.5
  • Experimentation
  • 10.6
  • TPM
  • 1.2
  • Changes
  • 10.7
  • Further Reading
  • 11
  • Experimenting with TCPA/TCG
  • 11.1
  • Desired Properties
  • 11.2
  • The Lifetime Mismatch
  • 11.3
  • Architecture
  • 11.4
  • Implementation Experience
  • 11.5
  • Application: Hardened Apache
  • 11.6
  • Application: OpenCA
  • 11.7
  • Application: Compartmented Attestation
  • 11.8
  • Further Reading
  • 12
  • New Horizons
  • 12.1
  • Privilege Architectures
  • 12.2
  • Hardware Research
  • 12.3
  • Software Research
  • 12.4
  • Current Industrial Platforms
  • 12.5
  • Looming Industry Platforms
  • 12.6
  • Secure Coprocessing Revisited
  • 12.7
  • Further Reading
  • Glossary
  • References
  • About the Author
  • Index