Abstract
Facing ubiquitous threats like computer viruses, trojans and theft of intellectual property, Trusted computing (TC) is an emerging technology towards building trustworthy computing platforms. A recent initiative by the trusted computing group (TCG) specifies the use of trusted platform modules (TPM), currently implemented as dedicated, cost-effective crypto-chips mounted on the main board of computer systems. In this paper we propose implementations for TC functionalities based on more flexible and versatile approaches for reconfigurable and embedded architectures. Our approach allows for (i) a scalable design and update of TPM functionalities in embedded systems, (ii) the integration of the TPM hardware in the chain of trust to bind applications to the underlying TPM and the reconfigurable hardware, and (iii) the design of vendor independent TPMs.
Original language | English |
---|---|
Title of host publication | 15th Annual IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM 2007) |
Number of pages | 2 |
Publisher | IEEE |
Publication date | 04.08.2007 |
Pages | 289-290 |
ISBN (Print) | 978-0-7695-2940-2 |
ISBN (Electronic) | 978-0-7695-2940-0 |
DOIs | |
Publication status | Published - 04.08.2007 |
Event | 15th Annual IEEE Symposium on Field-Programmable Custom Computing Machines - Napa, United States Duration: 23.04.2007 → 25.04.2007 |