Design and implementation of trusted boot based on a new trusted computing dual-architecture

被引:5
作者
Zheng, Chenming [1 ]
Li, Jun [2 ]
Yao, Xuanxia [1 ]
机构
[1] Univ Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing 100083, Peoples R China
[2] Dawning Informat Ind Co Ltd, Beijing 100193, Peoples R China
关键词
Security; TPM; Trusted computing; Hardware root-of-trust; Dual-architecture;
D O I
10.1016/j.cose.2023.103095
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Trusted Platform Module (TPM) is considered to be one of the best technologies to ensure computer sys-tem security at present, but it has some defects. The TPM chip exposed on the motherboard is easily monitored or bypassed. As a slave device on the bus, it is under the control of the master device and has no higher privileges to access system resources than the CPU used only to compute in traditional computers. The current trusted computing architecture cannot ensure that the TPM chip starts to work prior to the CPU. To solve these problems, this paper propose a new trusted computing dual-architecture, which is made up of a trusted computing subsystem and a traditional computing subsystem. A new hardware root-of-trust and a kind of boot process in the trusted computing dual-architecture are im-plemented to provide a higher-level trust for the whole system. In a word, the new trusted computing dual-architecture ensures that the hardware root-of-trust is a trusted source due to its dual-architecture design and trusted boot process. It can effectively introduce and set up a trusted chain for the whole computer system. Active-defense capabilities obtained can ensure system security to avoid those defects in previous trusted computing. (c) 2023 Published by Elsevier Ltd.
引用
收藏
页数:16
相关论文
共 53 条
[1]  
Abadi M, 2004, LECT NOTES COMPUT SC, V3235, P1
[2]   Cloud computing platform: Performance analysis of prominent cryptographic algorithms [J].
Ajmal, Abdullah ;
Ibrar, Sundas ;
Amin, Rashid .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (15)
[3]  
Angrisani L., 2020, PROC IEEE INT INSTRU, P1
[4]  
[Anonymous], 2009, ARM SECURITY TECHNOL
[5]   Verification of a Cryptographic Primitive: SHA-256 [J].
Appel, Andrew W. .
ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 2015, 37 (02)
[6]  
ARM Inc, 2022, AMBA AXI3 AXI4 PRO 1
[7]   Basic concepts and taxonomy of dependable and secure computing [J].
Avizienis, A ;
Laprie, JC ;
Randell, B ;
Landwehr, C .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2004, 1 (01) :11-33
[8]   A hybrid ARM-FPGA cluster for cryptographic algorithm acceleration [J].
Bai, Xu ;
Yang, Jiajia ;
Dai, Qiong ;
Chen, Zhaolin .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (24)
[9]  
Bernhard Grill B., 2014, P 7 EUROPEAN WORKSHO, P1
[10]   The IBM 4769 Cryptographic Coprocessor [J].
Busby, J. A. ;
Cohen, E. N. ;
Dames, E. A. ;
Doherty, J. ;
Dragone, S. ;
Evans, D. ;
Fisher, M. J. ;
Hadzic, N. ;
Hagleitner, C. ;
Higby, A. J. ;
Hocker, M. D. ;
Jagich, L. S. ;
Jordan, M. J. ;
Kisley, R. ;
Lamb, K. D. ;
Marik, M. D. ;
Mayfield, J. ;
Morris, T. E., Jr. ;
Needham, T. D. ;
Santiago-Fernandez, W. ;
Urban, V ;
Visegrady, T. ;
Werner, K. .
IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2020, 64 (5-6) :5-6