A novel architecture to virtualise a hardware-bound trusted platform module

被引:1
作者
De Benedictis, Marco [1 ]
Jacquin, Ludovic [2 ]
Pedone, Ignazio [1 ]
Atzeni, Andrea [1 ]
Lioy, Antonio [1 ]
机构
[1] Politecn Torino, Dip Automat & Informat, Corso Duca Degli Abruzzi 24, I-10129 Turin, Italy
[2] Hewlett Packard Enterprise, Hewlett Packard Labs, Bristol BS34 8QZ, England
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2024年 / 150卷
基金
欧盟地平线“2020”;
关键词
Computer security; Trust management; Platform virtualization; Cloud computing security; Trusted computing; Trusted platform module;
D O I
10.1016/j.future.2023.08.012
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Security and trust are particularly relevant in modern softwarised infrastructures, such as cloud environments, as applications are deployed on platforms owned by third parties, are publicly accessible on the Internet and can share the hardware with other tenants. Traditionally, operating systems and applications have leveraged hardware tamper-proof chips, such as the Trusted Platform Modules (TPMs) to implement security workflows, such as remote attestation, and to protect sensitive data against software attacks. This approach does not easily translate to the cloud environment, wherein the isolation provided by the hypervisor makes it impractical to leverage the hardware root of trust in the virtual domains. Moreover, the scalability needs of the cloud often collide with the scarce hardware resources and inherent limitations of TPMs. For this reason, existing implementations of virtual TPMs (vTPMs) are based on TPM emulators. Although more flexible and scalable, this approach is less secure. In fact, each vTPM is vulnerable to software attacks both at the virtualised and hypervisor levels. In this work, we propose a novel design for vTPMs that provides a binding to an underlying physical TPM; the new design, akin to a virtualisation extension for TPMs, extends the latest TPM 2.0 specification. We minimise the number of required additions to the TPM data structures and commands so that they do not require a new, non-backwards compatible version of the specification. Moreover, we support migration of vTPMs among TPM-equipped hosts, as this is considered a key feature in a highly virtualised environment. Finally, we propose a flexible approach to vTPM object creation that protects vTPM secrets either in hardware or software, depending on the required level of assurance.(c) 2023 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/).
引用
收藏
页码:21 / 36
页数:16
相关论文
共 30 条
  • [1] [Anonymous], 2021, TRUSTED PLATFORM MOD
  • [2] [Anonymous], 2021, AMD secure encrypted virtualization project website
  • [3] [Anonymous], 2021, Microsoft BitLocker overview
  • [4] [Anonymous], 2021, TCG TSS 2.0 TAB and resource manager specification
  • [5] [Anonymous], 2021, Virtualized Trusted Platform Architecture, Specification Version 1.0, Revision 0.26
  • [6] [Anonymous], 2021, TCG EK credential profile for TPM family 2.0
  • [7] [Anonymous], 2023, TCG TSS 2.0 system level API (SAPI) specification
  • [8] [Anonymous], 2021, Intel software guard extensions (intel sgx)
  • [9] [Anonymous], 2021, Integrity Report Schema, Specification Version 2.0, Revision 5
  • [10] ARM TrustZone technology website, 2021, About us