Trusted computing platforms
Titel: | Trusted computing platforms : design and applications / Sean W. Smith |
---|---|
Verfasser: | |
Veröffentlicht: | Boston : Springer Science + Business Media, 2005 |
Umfang: | XX, 244 S. |
Format: | E-Book |
Sprache: | Englisch |
RVK-Notation: | Vorliegende Ausgabe: | Online-Ausg.: 2005. - Online-Ressource. |
ISBN: | 0387239170 (Sekundärausgabe) ; 9780387239170 (Sekundärausgabe) |
Hinweise zum Inhalt: |
Inhaltsbeschreibung der Sammlung und Zugangshinweise
Cover |
- 1
- Introduction
- 1.1
- Trust and Computing
- 1.2
- Instantiations
- 1.3
- Design and Applications
- 1.4
- Progression
- 2
- Motivating Scenarios
- 2.1
- Properties
- 2.2
- Basic Usage
- 2.3
- Examples of Basic Usage
- 2.4
- Position and Interest
- 2.5
- Examples of Positioning
- 2.6
- The Idealogical Debate
- 2.7
- Further Reading
- 3
- Attacks
- 3.1
- Physical Attacks
- 3.2
- Software Attacks
- 3.3
- Side-channel Analysis
- 3.4
- Undocumented Functionality
- 3.5
- Erasing Data
- 3.6
- System Context
- 3.7
- Defensive Strategy
- 3.8
- Further Reading
- 4
- Foundations
- 4.1
- Applications and Integration
- 4.2
- Architectures
- 4.3
- Booting
- 4.4
- The Defense Community
- 4.5
- Further Reading
- 5
- Design Challenges
- 5.1
- Context
- 5.2
- Obstacles
- 5.3
- Requirements
- 5.4
- Technology Decisions
- 5.5
- Further Reading
- 6
- Platform Architecture
- 6.1
- Overview
- 6.2
- Erasing Secrets
- 6.3
- The Source of Secrets
- 6.4
- Software Threats
- 6.5
- Code Integrity
- 6.6
- Code Loading
- 6.7
- Putting it All Together
- 6.8
- What's Next
- 6.9
- Further Reading
- 7
- Outbound Authentication
- 7.1
- Problem
- 7.2
- Theory
- 7.3
- Design and Implementation
- 7.4
- Further Reading
- 8
- Validation
- 8.1
- The Validation Process
- 8.2
- Validation Strategy
- 8.3
- Formalizing Security Properties
- 8.4
- Formal Verification
- 8.5
- Other Validation Tasks
- 8.6
- Reflection
- 8.7
- Further Reading
- 9
- Application Case Studies
- 9.1
- Basic Building Blocks
- 9.2
- Hardened Web Servers
- 9.3
- Rights Management for Big Brother's Computer
- 9.4
- Private Information
- 9.5
- Other Projects
- 9.6
- Lessons Learned
- 9.7
- Further Reading
- 10
- TCPA/TCG
- 10.1
- Basic Structure
- 10.2
- Outbound Authentication
- 10.3
- Physical Attacks
- 10.4
- Applications
- 10.5
- Experimentation
- 10.6
- TPM
- 1.2
- Changes
- 10.7
- Further Reading
- 11
- Experimenting with TCPA/TCG
- 11.1
- Desired Properties
- 11.2
- The Lifetime Mismatch
- 11.3
- Architecture
- 11.4
- Implementation Experience
- 11.5
- Application: Hardened Apache
- 11.6
- Application: OpenCA
- 11.7
- Application: Compartmented Attestation
- 11.8
- Further Reading
- 12
- New Horizons
- 12.1
- Privilege Architectures
- 12.2
- Hardware Research
- 12.3
- Software Research
- 12.4
- Current Industrial Platforms
- 12.5
- Looming Industry Platforms
- 12.6
- Secure Coprocessing Revisited
- 12.7
- Further Reading
- Glossary
- References
- About the Author
- Index