Abstract
When developing and researching new trusted computing technologies, appropriate tools to investigate their behavior and to evaluate their performance are of paramount importance. In this paper, we present an efficient and portable TPM emulator for Unix. Our emulator enables not only the implementation of flexible and low-cost test-beds and simulators but, in addition, provides programmers of trusted systems with a powerful testing and debugging tool that can also be used for educational purposes. Thanks to its portability and interoperability, the TPM emulator runs on a variety of platforms and is compatible with the most relevant software packages and interfaces.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Aaraj, N., Raghunathan, A., Ravi, S., Jha, N.K.: Energy and Execution Time Analysis of a Software-Based Trusted Platform Module. In: Proceedings of the Conference on Design, Automation and Test in Europe (DATE 2007), pp. 1128–1133 (2007)
Anderson, M.J., Moffie, M., Dalton, C.I.: Towards Trustworthy Virtualisation Environments: Xen Library OS Security Service Infrastructure. Technical Report HPL-2007-69, HP Laboratories Bristol (April 2007)
Matt Bishop. Computer Security: Art and Science. Addison Wesley, Reading (2003)
Granlund, T., et al.: GNU Multiple Precision Arithmetic Library.
Challener, D., et al.: A Practical Guide to Trusted Computing. IBM Press (2007)
Mitchell, C., et al.: Trusted Computing. IET (2005)
Sadeghi, A.-R., Selhorst, M., Stüble, C., Wachsmann, C., Winandy, M.: TCG inside? A Note on TPM Specification Compliance. In: Proceedings of the 1st ACM Workshop on Scalable Trusted Computing (STC 2006), pp. 47–56 (2006)
Sarmenta, L.F.G., van Dijk, M., O’Donnell, C.W., Rhodes, J., Devadas, S.: Virtual monotonic counters and count-limited objects using a TPM without a trusted OS. In: Proceedings of the 1st ACM Workshop on Scalable Trusted Computing (STC 2006), pp. 27–42 (2006)
Strasser, M., et al.: Software-based TPM Emulator, http://tpm-emulator.berlios.de/
Trusted Computing Group. Architecture Overview
Trusted Computing Group. TPM Software Stack (TSS) Specification, Version 1.2, https://www.trustedcomputinggroup.org/specs/TSS/
Trusted Computing Group. TPM Specification, Version 1.2, Revision 103, https://www.trustedcomputinggroup.org/specs/TPM .
TU Graz, IAIK. jTSS – Java TCG Software Stack, http://trustedjava.sourceforge.net/
Yoder, K., et al.: TrouSerS – Open-source TCG Software Stack, http://trousers.sourceforge.net/
Zimmermann, R.: IBM Direct Anonymous Attestation Tools – TPM Test Suite, http://www.zurich.ibm.com/security/daa/
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Strasser, M., Stamer, H. (2008). A Software-Based Trusted Platform Module Emulator. In: Lipp, P., Sadeghi, AR., Koch, KM. (eds) Trusted Computing - Challenges and Applications. Trust 2008. Lecture Notes in Computer Science, vol 4968. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-68979-9_3
Download citation
DOI: https://doi.org/10.1007/978-3-540-68979-9_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-68978-2
Online ISBN: 978-3-540-68979-9
eBook Packages: Computer ScienceComputer Science (R0)