TY - GEN
T1 - Dependable TCB based on the cell broadband engine™ isolation facility
AU - Murase, Masana
AU - Tokuda, Hideyuki
PY - 2011/12/1
Y1 - 2011/12/1
N2 - A Trusted Computing Base (TCB) such as a Trusted Platform Module (TPM) or a Mobile Trusted Module plays an essential role for security and privacy applications in embedded systems such as cell phones, smart sensors, and actuators. However, existing hardware-based TCBs lack flexibility for function updates, bug fixes, and feature updates. In this paper, we present a dependable TCB on a Cell Broadband Engine™processor by providing a hardware and software hybrid TPM. Unlike prior approaches, we provide three new features: (1) TPM functions are implemented in software running in memory isolated by hardware, (2) our software TPM is launched and establishes a chain of trust from the hardware using a secure boot method, and (3) a new TPM command provides dynamic patching to the running software TPM and secure code overlays for the efficient use of the limited resources. We show the feasibility of this hybrid implementation of the TPM by assessing its performance and security properties.
AB - A Trusted Computing Base (TCB) such as a Trusted Platform Module (TPM) or a Mobile Trusted Module plays an essential role for security and privacy applications in embedded systems such as cell phones, smart sensors, and actuators. However, existing hardware-based TCBs lack flexibility for function updates, bug fixes, and feature updates. In this paper, we present a dependable TCB on a Cell Broadband Engine™processor by providing a hardware and software hybrid TPM. Unlike prior approaches, we provide three new features: (1) TPM functions are implemented in software running in memory isolated by hardware, (2) our software TPM is launched and establishes a chain of trust from the hardware using a secure boot method, and (3) a new TPM command provides dynamic patching to the running software TPM and secure code overlays for the efficient use of the limited resources. We show the feasibility of this hybrid implementation of the TPM by assessing its performance and security properties.
UR - http://www.scopus.com/inward/record.url?scp=84855558373&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84855558373&partnerID=8YFLogxK
U2 - 10.1109/RTCSA.2011.45
DO - 10.1109/RTCSA.2011.45
M3 - Conference contribution
AN - SCOPUS:84855558373
SN - 9780769545028
T3 - Proceedings - 17th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2011
SP - 360
EP - 370
BT - Proceedings - 17th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2011
T2 - 17th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2011
Y2 - 28 August 2011 through 31 August 2011
ER -