Trusted Bootstrap of Para-Virtualized Domain

Article Preview

Abstract:

Trusted Computing technique can be applied to alleviate the concerns for the security of virtual machines (VMs), accompanying the increase in the use of virtualization technology. This paper aims to provide for guest para-virtualized machine (GPVM) applications a complete trusted chain from the physical TPM in a flexible way. We propose a robust and fast method for measuring the integrity of the system booting files of a GPVM. This method integrated with the existing integrity measure software such as Trusted Grub and Integrity Measurement Architecture (IMA) can provide the complete trusted chain. Compared to the existing method of measuring the GPVM integrity, our method is very flexible and fast.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2059-2065

Citation:

Online since:

June 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Trusted Computing Group: Trusted Platform Module (TPM) specifications. http: /www. trustedcomputinggroup. org/ resources/tpm_main_specification.

Google Scholar

[2] P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield: Xen and the art of virtualization, in Proc. 19th ACM symposium on Operating systems principles, (2003), pp.164-177.

DOI: 10.1145/945445.945462

Google Scholar

[3] F. Stumpf, M. Benz, M. Hermanowski, and C. Eckert: An Approach to a Trustworthy System Architecture Using Virtualization, in Lecture Notes in Computer Science, vol. 4610, (2007), pp.191-202.

DOI: 10.1007/978-3-540-73547-2_21

Google Scholar

[4] S. Berger, R. Cáceres, K. A. Goldman, R. Perez, R. Sailer, and L. van Doorn: vTPM: Virtualizing the Trusted Platform Module, in Proc. 15th USENIX Security Symposium, (2006), pp.305-320.

Google Scholar

[5] Trusted Computing Group. https: /www. trustedcomputinggroup. org.

Google Scholar

[6] Trusted Computing Group: TCG Specification Architecture Overview, Specification Revision 1. 4, 2nd August 2008. http: /www. trustedcomputinggroup. org/resources/tcg_architecture_overview_version_14.

Google Scholar

[7] H. Maruyama, T. Nakamura, S. Munetoh, Y. Funaki, and Y. Yamashita: Linux with TCPA Integrity Measurement, in IBM Research Report, RT0507 (2003).

Google Scholar

[8] GNU GRUB: http: /www. gnu. org/software/grub.

Google Scholar

[9] R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn: Design and Implementation of a TCG-based Integrity Measurement Architecture, in Proc. 13th USENIX Security Symposium (2004).

Google Scholar

[10] S. Munetoh: Practical Integrity Measurement and Remote Verification for Linux Platform, in IBM Research Report (2006).

Google Scholar

[11] D. Chisnall: The Definitive Guide to the Xen Hypervisor. Prentice Hall (2007).

DOI: 10.1145/1394127.1394143

Google Scholar