Ideally application developers should be able to produce their code without consideration of the Trusted Platform Module (TPM) on which the software may run, and the more systems builders can use standard hardware, the lower the cost will be.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
The article is part of our 2009 series featuring the best new MSc theses from graduates of the information security group at RHUL.
It discusses a new architecture for trusted computing in which an existing fixed-function Trusted Platform Module (TPM) is coupled with user application code running on a programmable smart card. Rather than proposing recommendations for hardware changes or building isolated execution environments inside a TPM, the author proposes a platform that provides related, yet different services for secure/trusted execution, and couples this with the TPM.
He argues that implementing such a solution allows application developers to focus exclusively on the functionality and security of their own code, and enables them to execute their applications shielded from both hardware and software attacks.
The article provides broad background on the limitations of existing models, as well as explains how this new approach could exploit the benefits of standard hard to keep down costs. The author also suggests several possible applications where it would be most effective.
Read A virtual programmable trusted platform (.pdf) by Talha Tariq.
SearchSecurity's association with RHUL began last year when we published 12 articles from RHUL's MSc graduates. These were widely appreciated for their new ideas and relevance to security problems. We believe the 2009 series is equally wide-ranging and thought-provoking.