Open Access System for Information Sharing

Login Library

 

Thesis
Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads
Full metadata record
Files in This Item:
There are no files associated with this item.
DC FieldValueLanguage
dc.contributor.authorGao, Mingyuanen_US
dc.date.accessioned2014-12-01T11:48:58Z-
dc.date.available2014-12-01T11:48:58Z-
dc.date.issued2013en_US
dc.identifier.otherOAK-2014-01519en_US
dc.identifier.urihttp://postech.dcollection.net/jsp/common/DcLoOrgPer.jsp?sItemId=000001628463en_US
dc.identifier.urihttps://oasis.postech.ac.kr/handle/2014.oak/2021-
dc.descriptionMasteren_US
dc.description.abstractAs mobile technology matures, mobile devices (principally smart phones and tablets) are increasingly being used in both personal and corporate environments. While mobile devices bring great convenience to us, security problems also ensue. Current mobile devices lack the hardware-based root of trust features (e.g., Trusted PlatformModule, or TPM) that are increasingly built into laptops, PCs and other types of hosts. Unfortunately, mobile devices are constrained in space, cost and power dimensions that make the use of a discrete TPM difficult. Since a software-based TPM emulator can provide the same capabilities of a hardware TPM in terms of TPM Commands, thus, if 1) the roots of trust of the TPM emulator can be securely handled, 2) an isolated secure environment can be provisioned in the mobile device, be it software environment or hardware environment, without the presence of a hardware TPM, the approximate same capabilities of a hardware TPM can be obtained by running a software-based TPM emulator in the said secure environment. In this thesis, we assume the roots of trust of a software-based TPM emulator are securely handled. However, even with the above assumption, how to provision the isolated secure environment is still a challenging task.In this thesis, three approaches are proposed in the context of ARM virtualization environment, i.e., Linux Container (LXC)-based Approach, Virtual Machine (VM)-based Approach, and Firmware TPM (which is based on TrustZone Virtualization). LXC-based approach uses a LXC to protect the software-based TPM emulator, and VM-based approach uses a VMen_US
dc.description.abstractthese two approaches were implemented and evaluated. Firmware TPM refers to the alternate software implementation of the TPM specification in the context of a Trusted Execution Environmenten_US
dc.description.abstractthe proposed reference architecture for Firmware TPM is given in the thesis, but its implementation is left as future work in that this approach requires far more programming effort than a master’s thesis project.The evaluation result showed that the software-based TPM emulator can provide the same capabilities of a hardware TPM provided that 1) the roots of trust of the emulator are securely handled, 2) the proposed secure environments (Linux Container or VM) are secure enough. Though the addition of a software-based TPM Emulator on a mobile device incurs some overhead on the system, the overhead is acceptable for modern mobile devices, which typically shipped with more than 1GB memory and 1GHZ or faster CPUs.In the last, recommended optimizations for current work are provided, along with considerations on future implementation of Firmware TPM.en_US
dc.languageengen_US
dc.publisher포항공과대학교en_US
dc.rightsBY_NC_NDen_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/2.0/kren_US
dc.titleSupporting Software-based TPM Emulator in ARM Virtualization Environmenten_US
dc.title.alternativeARM 가상화 환경에서 소프트웨어기반 TPM 에물레이터 지원 방법en_US
dc.typeThesisen_US
dc.contributor.college일반대학원 컴퓨터공학과en_US
dc.date.degree2013- 8en_US
dc.type.docTypeThesis-

qr_code

  • mendeley

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Views & Downloads

Browse