The Trusted Execution Module: Commodity general-purpose trusted computing

被引:0
|
作者
Costan, Victor [1 ]
Sarmenta, Luis F. G. [1 ]
van Dijk, Marten [1 ]
Devadas, Srinivas [1 ]
机构
[1] MIT, Comp Sci & Artificial Intelligence Lab, Cambridge, MA 02139 USA
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper introduces the Trusted Execution Module (TEM); a high-level specification for a commodity chip that can execute user-supplied procedures in a trusted environment. The TEM is capable of securely executing partially-encrypted procedures/closures expressing arbitrary computation. These closures can be generated by any (potentially untrusted) party who knows the TEM's public encryption key. Compared to a conventional smartcard, which is typically used by pre-programming a limited set of domain- or application- specific commands onto the smartcard, and compared to the Trusted Platform Module (TPM), which is limited to a fixed set of cryptographic functions that cannot be combined to provide general-purpose trusted computing, the TEM is significantly more flexible. Yet we present a working implementation using existing inexpensive Javacard smartcards that does not require any export-restricted technology. The TEM's design enables a new style of programming, which in turn enables new applications. We show that the TEM's guarantees of secure execution enable exciting applications that include, but are not limited to, mobile agents, peer-to-peer multiplayer online games, and anonymous offline payments.
引用
收藏
页码:133 / 148
页数:16
相关论文
共 50 条
  • [21] Rethinking General-Purpose Decentralized Computing
    Alp, Enis Ceyhun
    Kokoris-Kogias, Eleftherios
    Fragkouli, Georgia
    Ford, Bryan
    [J]. PROCEEDINGS OF THE WORKSHOP ON HOT TOPICS IN OPERATING SYSTEMS (HOTOS '19), 2019, : 105 - 112
  • [22] Using trusted computing in trusted mail transfer protocol
    Mohamed, Fady A.
    Hemayed, Elsayed E.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (05) : 926 - 933
  • [23] Awesome Trusted Execution Environment
    Coppolino, Luigi
    Mazzeo, Giovanni
    Romano, Luigi
    [J]. 2023 53RD ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS - SUPPLEMENTAL VOLUME, DSN-S, 2023, : 5 - 6
  • [24] Trusted Execution on Leaky Hardware?
    Genkin, Daniel
    Yarom, Yuval
    [J]. PROCEEDINGS OF THE 3RD WORKSHOP ON SYSTEM SOFTWARE FOR TRUSTED EXECUTION (SYSTEX'18), 2018, : 1 - 1
  • [25] A Trusted Remote Attestation Model based on Trusted Computing
    Yu, Yue
    Wang, Huaimin
    Liu, Bo
    Yin, Gang
    [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 1504 - 1509
  • [26] Trusted computing, trusted third parties, and verified communications
    Abadi, M
    [J]. SECURITY AND PROTECTION IN INFORMATION PROCESSING SYSTEMS, 2004, 147 : 291 - 308
  • [27] Trusted mobile devices: Requirements for a mobile Trusted Platform Module
    [J]. McGill, K.N. (kathleen.mcgill@jhuapl.edu), 2013, John Hopkins University (32):
  • [28] Research on trusted storage based on trusted computing platform
    School of Computer, Wuhan University, Wuhan 430072, China
    不详
    [J]. Tongxin Xuebao, 2007, SUPPL. (117-120):
  • [29] Challenges for Trusted Computing
    Sadeghi, Ahmad-Reza
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006, PROCEEDINGS, 2006, 4249 : 414 - 414
  • [30] Firmware of trusted channel based on the trusted platform control module
    Mao Junjie
    Zhang Chongbin
    Zhang Baofeng
    Guo Ying
    Wu Yushu
    Xie Shihua
    Zhang Xiaofei
    Zhao Shuang
    [J]. 2013 6TH INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKS AND INTELLIGENT SYSTEMS (ICINIS), 2013, : 189 - 192