Establishing Chain of Trust in Reconfigurable Hardware

Thomas Eisenbarth, Tim Guneysu, Christof Paar, Ahmad-Reza Sadeghi, Marko Wolf, Russell Tessier

Abstract


Facing ubiquitous threats like computer viruses, trojans and theft of intellectual property, Trusted computing (TC) is an emerging technology towards building trustworthy computing platforms. A recent initiative by the trusted computing group (TCG) specifies the use of trusted platform modules (TPM), currently implemented as dedicated, cost-effective crypto-chips mounted on the main board of computer systems. In this paper we propose implementations for TC functionalities based on more flexible and versatile approaches for reconfigurable and embedded architectures. Our approach allows for (i) a scalable design and update of TPM functionalities in embedded systems, (ii) the integration of the TPM hardware in the chain of trust to bind applications to the underlying TPM and the reconfigurable hardware, and (iii) the design of vendor independent TPMs.
Original languageEnglish
Title of host publication 15th Annual IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM 2007)
Number of pages2
PublisherIEEE
Publication date04.08.2007
Pages289-290
ISBN (Print)978-0-7695-2940-2
ISBN (Electronic)978-0-7695-2940-0
DOIs
Publication statusPublished - 04.08.2007
Event15th Annual IEEE Symposium on Field-Programmable Custom Computing Machines - Napa, United States
Duration: 23.04.200725.04.2007

Fingerprint

Dive into the research topics of 'Establishing Chain of Trust in Reconfigurable Hardware'. Together they form a unique fingerprint.

Cite this