16th USENIX Security Symposium – Abstract
Pp. 229–237 of the Proceedings
OSLO: Improving the Security of Trusted Computing
Bernhard Kauer, Technische Universität Dresden
Abstract
In this paper we describe bugs and ways to attack trusted
computing systems based on a static root of trust such as
Microsoft's Bitlocker. We propose to use the dynamic root of
trust feature of newer x86 processors as this shortens the
trust chain, can minimize the Trusted Computing Base of
applications and is less vulnerable to TPM and BIOS attacks.
To support our claim we implemented the Open Secure LOader
(OSLO), the first publicly available bootloader based on AMDs
skinit instruction.
- View the full text of this paper in HTML and PDF. Listen to the presentation in MP3 format.
Until August 2008, you will need your USENIX membership identification in order to access the full papers.
The Proceedings are published as a collective work, © 2007 by the USENIX Association. All Rights Reserved. Rights to individual papers remain with the author or the author's employer. Permission is granted for the noncommercial reproduction of the complete work for educational or research purposes. USENIX acknowledges all trademarks within this paper.
|