Erica Burch Jesse Forrest Trusted Computing Erica Burch Jesse Forrest
What is Trusted Computing? Refers to technology from the Trusted Computing Group (TCG) which allows for computers and servers to offer improved computer security and protection from computer viruses and the like.
Who is the Trusted Computing Group? A controversial initiative led by: AMD Hewlett-Packard IBM Intel Microsoft Sony Sun Microsystems https://www.trustedcomputinggroup.org/home
TC Basic System Concepts CPU is identified using certificates Encryption is performed in the hardware Data can be signed with the machine’s identification Data can be encrypted with the machine’s secret key
Proposals for 4 New Features Secure I/O is verified using checksums Malicious software injecting itself in this path can be identified Cannot defend against a hardware based attack
Proposals for 4 New Features 2. Memory curtaining has the hardware keep programs from reading or writing each other’s memory Information is secure from an intruder with control over OS
Proposals for 4 New Features 3. Sealed storage protects private information with encryption from a key derived from corresponding hardware and software Data can only be read by the same combination of software and hardware Protected against dictionary attacks
Proposals for 4 New Features 4. Remote attestation allows changes to user’s computer to be detected Hardware generates a certificate stating what software is currently running Combined with public-key encryption to present certificate to remote party
Controversy “TC allows computer manufacturers and software authors to monitor and control what users may do with their computers” Users can’t change software Users do not control information they receive Users do not control their data Loss of Internet Anonymity Proposed owner override for TC
Controversy Continued… There is no way to determine if the hardware has been properly implemented or if any backdoors have been added. Cryptographic designs and algorithms may become obsolete which will mean that users will be forced into unwanted upgrades with high switching costs. In the event of a hardware failure, there is no way to reclaim encrypted data which means vital information may be lost forever.
Computer Security Threat Models Computer Security concerns the protection of information assets. For personal computers this means the protection of stored data and programs. Protection typically involves confidentiality, integrity, and availability.
Threat Models – Scenario 1 Traditional PC Threat Model The owner is trusted, has full control over the PC, and is recognized by a password or biometrics. Adversary is an unauthorized user. PC Owner PC Hacker Trusted Trusted Not Trusted
Threat Models – Scenario 2 TC Threat Model Similar to Personal Computers Mode, except that in this case the trust between the PC and its owner is broken. Only the PC is trusted. PC Owner PC Hacker Not Trusted Trusted Not Trusted
Threat Models – Scenario 3 Digital Forensic Threat Model Similar to TC model. However, The law enforcement agent is able to extract incriminating data stored on the computer. PC Owner PC Law Enforcement Not Trusted Trusted Trusted
Topics Discussed What Trusted Computing (TC) is. Who is the Trusted Computing Group (TCG). The 5 Components to Make TC Work. Proposals for 4 New Features in TC. TC Controversy The 3 threat models.
References http://www.againsttcpa.com https://www.trustedcomputinggroup.org/home http://www.wikipedia.com http://www.lafkon.net/tc/TC_MID.html