Academic
Publications
Threat-adaptive architectures for trusted platform modules in secure computing systems

Threat-adaptive architectures for trusted platform modules in secure computing systems,10.1109/EIT.2010.5612177,Vijay Anand,Jafar Saniie,Erdal Oruklu

Threat-adaptive architectures for trusted platform modules in secure computing systems   (Citations: 1)
BibTex | RIS | RefWorks Download
A hardware system entrusted with security is referred to as the trusted platform module (TPM) which is available for various processor architectures. The two important processor architectures which account for most of general computing systems are based on ARM and x86 processors. The ARM processors have a TPM referred to as TrustZone architecture. The x86 systems' security directives are dictated by the Trusted Computing Group (TCG) which defines the TPM coprocessor features. In this paper, we compare these two approaches of TPM architectures. An effective TPM needs to be adaptive as threats evolve. Threats can arise from firmware bugs in the TPM or decay in the complexity of ciphering algorithms. Therefore, we propose adaptive TPM architecture to counter evolving threats using an FPGA block to alter and patch firmware and change ciphering systems. This along with the one to one association of an explicit security policy with threat is shown to be a powerful counter towards evolving threats.
Cumulative Annual
View Publication
The following links allow you to view full publications. These links are maintained by other sources not affiliated with Microsoft Academic Search.
Sort by: