outline Purpose Design Implementation Market Conclusion presentation Outline
purpose Provide both a hardware & software solution to improve computer security Evaluate trust computing (i.e. platform module) Produce a marketable product purpose
Computer vulnerabilities Goal: Authenticate all channels of communication to secure the machine problem
Memory Graphics Chipset Processor hardware design Attestation Encryption Authentication
Domain manager Trusted platform module (TPM) Sealed storage Key instructions: SENTER, SEXIT software design
Launch Sequence: SENTER- chipset & CPU Loads code (AC) into register SEXIT- clear memory software design (cont’d)
implementation Primary client: corporate Secure financial & propriety information Cost-effective security Relationship with Intel between IT and developers Secondary client: consumer Prevent compromised performance Real-measure of security (vs firewalls, service packs, etc) User-friendly
market Workstations Servers OEMs (Dell, Gateway, etc) Consumer computers
conclusions Enhances Intel processors, chipsets, and platforms Creates a hardware that protects data from software-based attacks Implements well-known security properties
references acknowledgements Intel, Professor King University of the Pacific