- Xidian University
- Xi'an Jiaotong University
- Macquarie University
- State University of New York at Buffalo
Trusted Computing (TC) is a technology developed and promoted by the Trusted Computing Group (TCG), and aims to enhance the overall security, privacy and trustworthiness of a variety of computing devices. The core of the trusted computing technologies of TCG is the Trusted Platform Module (TPM), a tamper-resistant module embedded in a platform, which is implemented by a TPM chip and designed to resist software attacks and moderate hardware attacks. TPM includes non-volatile storage, a set of Platform Configuration Registers (PCRs) and an engine for cryptographic operations. Based on TPM and TCG Software Stack (TSS), a suite of mechanisms can be realized, including memory curtaining, protected execution, secure I/O, sealed storage, platform measurement and remote attestation. As a fundamental secure computing module, TPM is the root trust module to establish security and trust in digital computing, communication and networking. Basically, it can support secure booting and trustworthy software installation, private data protection and Digital Rights Management (DRM), as well as remote attestation- based trusted communications and collaboration. There is significant research currently in the field of trusted computing, in both academia and industry. Recent efforts focus on TC module development and extension, trustworthy software assurance, Trusted Execution Environment (TEE), trusted collaboration and trusted storage. The recent advance of Intel Software Guard Extensions (Intel® SGX) offers hardware-assistant TEE, which allows user code execution in a private region of memory, called enclave, in an untrusted third party. This technology attracts special attention and motivates innovations of many applications.
|Number of pages||5|
|Publication status||Published - 1 Jan 2020|
|MoE publication type||B1 Article in a scientific magazine|