How to build a trusted virtualized platform
Posted on 23 September 2011.
Trusted Computing Group (TCG) released the first Virtualized Platform Architecture, which describes how to build a trusted virtualized platform.

With this specification, robust Trusted Computing technologies based on the TCG’s core concepts of the hardware root of trust can be added to existing virtual machine managers (VMMs), allowing virtual machines (VM) on the same platform to share hardware roots of trust.


A trusted virtual platform presents some unique challenges when compared to trusted physical platforms. These challenges occur when the Trusted Platform Module (TPM) is implemented in software in the VMM layer, but the TPM is still expected to provide the core security protections as if it was implemented in hardware.

For example, all of the TPM’s private data may be present inside the VMM software layer, creating the opportunity for customers to backup/restore the TPM or migrate the TPM to a new platform along with its VM. TPM migration and restore usages present some new potential threats that need to be addressed.

The new TCG Virtualized Trusted Platform Architecture specification defines how a virtual TPM will behave and how it can be used with a physical TPM to allow remote parties to evaluate the level of trust offered by the overall platform (VM and its underlying VMM).

The specification defines terminology, component features, and the virtualization layering design blueprint to ensure a common approach, as well as security requirements and implementation considerations for a TCG-compatible trusted platform. However, it does not specify how virtual or physical machines are specifically implemented by vendors.

“With the rapid adoption of virtualization in client and server systems, it’s time to incorporate Trusted Computing into this model to ensure that the software and trust properties of both the virtual and physical environments are the same,” notes Lee Wilson, chair, TCG Virtualized Platform Work Group and IBM. “Without the foundation of trust properties, virtualized systems with their software-based hypervisors remain vulnerable to a variety of attacks and will not offer the level of security required for enterprise and government computing."





Spotlight

USBdriveby: Compromising computers with a $20 microcontroller

Posted on 19 December 2014.  |  Security researcher Samy Kamkar has devised a fast and easy way to compromise an unlocked computer and open a backdoor on it: a simple and cheap ($20) pre-programmed Teensy microcontroller.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Fri, Dec 19th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //