Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/1266366.1266610acmconferencesArticle/Chapter ViewAbstractPublication PagesdateConference Proceedingsconference-collections
Article

Energy and execution time analysis of a software-based trusted platform module

Published: 16 April 2007 Publication History

Abstract

Trusted platforms have been proposed as a promising approach to enhance the security of general-purpose computing systems. However, for many resource-constrained embedded systems, the size and cost overheads of a separate Trusted Platform Module (TPM) chip are not acceptable. One alternative is to use a software-based TPM (SW-TPM), which implements TPM functions using software that executes in a protected execution domain on the embedded processor itself. However, since many embedded systems have limited processing capabilities and are battery-powered, it is also important to ensure that the computational and energy requirements for SW-TPMs are acceptable.
In this work, we perform an evaluation of the energy and execution time overheads for a SW-TPM implementation on a Sharp Zaurus PDA. We characterize the execution time and energy required by each TPM command through actual measurements on the target platform. In addition, we also evaluate the overheads of using SW-TPM in the context of various end applications, including trusted boot of the Linux operating system (OS), secure file storage, secure VoIP client, and secure web browser. Furthermore, we observe that for most TPM commands, the overheads are primarily due to the use of 2048-bit RSA operations that are performed within SW-TPM. In order to alleviate SW-TPM overheads, we evaluate the use of Elliptic Curve Cryptography (ECC) as a replacement for the RSA algorithm specified in the Trusted Computing Group (TCG) standards. Our experiments indicate that this optimization can significantly reduce SW-TPM overheads (an average of 6.51X execution time reduction and 6.75X energy consumption reduction for individual TPM commands, and an average of 10.25X execution time reduction and 10.75X energy consumption reduction for applications). Our work demonstrates that ECC-based SW-TPMs are a viable approach to realizing the benefits of trusted computing in resource-constrained embedded systems.

References

[1]
"CERT research 2005 annual report." {Online}. Available: http://www.cert.org/archive/pdf/cert_rsch_annual_rpt_2005.pdf
[2]
S. Ravi, A. Raghunathan, P. Kocher, and S. Hattangady, "Security in embedded systems: Design challenges," ACM Trans, on Embedded Computing Systems, vol. 3, pp. 461--491, Aug. 2004.
[3]
TCG Glossary. TCG, 2004. {Online}. Available: http://www.trustedcomputinggroup.org/groups/TCG_Glossary.pdf
[4]
"IBM thinkpad." {Online}. Available: http://www.pc.ibm.com/us/thinkpad
[5]
"Lifebook S7000 notebook." {Online}. Available: http://www.computers.us.fujitsu.com
[6]
"R. Kay, How to implement trusted computing." {Online}. Available: https://www.trustedcomputinggroup.org/news/Industry_Data
[7]
S. W. Smith, Trusted Computing Platforms, Design and Applications. Springer, 2005.
[8]
R. Sandhu and X. Zhang, "Peer-to-peer access control architecture using trusted computing technology," in Proc. ACM Symp. on Access Control Models and Technologies, June 2005, pp. 147--158.
[9]
E. Shi, A. Perrig, and L. V. Doorn, "BIND: A fine-grained attestation service for secure distributed systems," in Proc. IEEE Symp. Security and Privacy, May 2005, pp. 154--168.
[10]
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh, "Terra: A virtual machine-based platform for trusted computing," in Proc. ACM Symp. Operating Systems Principles, Oct. 2003, pp. 193--206.
[11]
"IBM research report." {Online}. Available: https://www.trustedcomputinggroup.org/news/articles/rc23363.pdf
[12]
G. Xu, C. Borcea, and L. Iftode, "Satem: Trusted service code execution across transactions," in Proc. IEEE Int. Symp. Reliable Distributed Systems, Oct. 2006.
[13]
Trusted Computing Group, "TCG Specification Architecture Overview," Apr. 2004.
[14]
"Trusted Mobile Platform." {Online}. Available: http://www.trusted-mobile.org
[15]
"Secure extensions to the ARM architecture." {Online}. Available: http://www.arm.com/trustzone
[16]
"M. Strasser, TPM Emulator." {Online}. Available: http://developer.berlios.de/projects/tpm-emulator
[17]
"Mersenne Twister Random Numbers Generator." {Online}. Available: http://www.math.sci.hiroshima-u.ac.jp/m-mat/MT/ewhat-is-mt.html
[18]
"Sharp Zaurus SL-5600." {Online}. Available: http://www.linuxjournal.com/article/6792
[19]
"OpenSSl Project." {Online}. Available: www.openssl.org
[20]
D. Hankerson, J. L. Hernandez, and A. Menezes, Software Implementation of Elliptic Curve Cryptography Over Binary Fields. Lecture Notes in Computer Science, 2000.
[21]
"Sun's elliptic curve technology contribution to the OpenSSL." {Online}. Available: http://research.sun.com/projects/crypto/FrequenlyAskedQuestions.html
[22]
"TrouSerS-an open-source TCG Software Stack implementation." {Online}. Available: http://sourceforge.net/projects/trousers
[23]
"GRUB TCG Patch to support Trusted Boot." {Online}. Available: trousers.sourceforge.net/grub.html
[24]
"Asterisk {the open source PBX." {Online}. Available: http://www.asterisk.org
[25]
M. Broekman, End-To-End Application Security using Trusted Computing, 2005. {Online}. Available: http://www.cs.ru.nl/onderwijs/afstudereninfo/scripties/2005/MichielBroekmanScriptie.pdf

Cited By

View all
  • (2018)Using mobile phones to enhance computing platform trustTelecommunications Systems10.1007/s11235-018-0456-y69:2(187-205)Online publication date: 1-Oct-2018
  • (2015)Reliable Integrity Checking in Multicore ProcessorsACM Transactions on Architecture and Code Optimization10.1145/273805212:2(1-23)Online publication date: 11-May-2015
  1. Energy and execution time analysis of a software-based trusted platform module

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      DATE '07: Proceedings of the conference on Design, automation and test in Europe
      April 2007
      1741 pages
      ISBN:9783981080124

      Sponsors

      Publisher

      EDA Consortium

      San Jose, CA, United States

      Publication History

      Published: 16 April 2007

      Check for updates

      Qualifiers

      • Article

      Conference

      DATE07
      Sponsor:
      • EDAA
      • SIGDA
      • The Russian Academy of Sciences
      DATE07: Design, Automation and Test in Europe
      April 16 - 20, 2007
      Nice, France

      Acceptance Rates

      Overall Acceptance Rate 518 of 1,794 submissions, 29%

      Upcoming Conference

      DATE '25
      Design, Automation and Test in Europe
      March 31 - April 2, 2025
      Lyon , France

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)3
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 02 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2018)Using mobile phones to enhance computing platform trustTelecommunications Systems10.1007/s11235-018-0456-y69:2(187-205)Online publication date: 1-Oct-2018
      • (2015)Reliable Integrity Checking in Multicore ProcessorsACM Transactions on Architecture and Code Optimization10.1145/273805212:2(1-23)Online publication date: 11-May-2015

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media