vTPM: Virtualizing the Trusted Platform Module
@inproceedings{Berger2006vTPMVT, title={vTPM: Virtualizing the Trusted Platform Module}, author={Stefan Berger and Ram{\'o}n C{\'a}ceres and Kenneth A. Goldman and Ronald Perez and Reiner Sailer and Leendert van Doorn}, booktitle={USENIX Security Symposium}, year={2006} }
We present the design and implementation of a system that enables trusted computing for an unlimited number of virtual machines on a single hardware platform. To this end, we virtualized the Trusted Platform Module (TPM). As a result, the TPM's secure storage and cryptographic functions are available to operating systems and applications running in virtual machines. Our new facility supports higher-level services for establishing trust in virtualized environments, for example remote attestation…
Figures and Tables from this paper
614 Citations
E2VT: An Effective and Efficient VM-Transparent Mechanism for Preventing TPVM OS Boot Failure
- Computer Science2012 IEEE Asia-Pacific Services Computing Conference
- 2012
This paper design and implement E2VT, an effective and efficient mechanism for preventing the TPVM OS boot failure while being transparent to the TP VM system, maintaining the original system performance, and making minimal modifications to the existing architecture.
Improving Xen security through disaggregation
- Computer ScienceVEE '08
- 2008
This paper introduces the work to disaggregate the management virtual machine in a Xen-based system, and describes the implementation, which moves the domain builder, the most important privileged component, into a minimal trusted compartment.
Dependable TCB Based on the Cell Broadband Engine Isolation Facility
- Computer Science2011 IEEE 17th International Conference on Embedded and Real-Time Computing Systems and Applications
- 2011
This paper presents a dependable TCB on a Cell Broadband Engine TM processor by providing a hardware and software hybrid TPM, and shows the feasibility of this hybrid implementation of the TPM by assessing its performance and security properties.
Obtaining the Integrity of Your Virtual Machine in the Cloud
- Computer Science2011 IEEE Third International Conference on Cloud Computing Technology and Science
- 2011
This paper designed and implemented TCG(trusted computing group)-based remote attestation for the Xen VM under the assumption that the trusted platform module(TPM) and hyper visor are secure and the privileged domain0 may be malicious.
Enabling secure VM-vTPM migration in private clouds
- Computer ScienceACSAC '11
- 2011
This work detail the requirements that a secure VM-vTPM migration solution should satisfy in private virtualized environments and proposes a vTPM key structure suitable for VM-tPM migration, and shows that the proposed protocol provides stronger security guarantees when compared to existing solutions forVM-v TPM migration.
On the security of virtual machine migration and related topics
- Computer Science
- 2010
A secure migration protocol is proposed using a novel vTPM key hierarchy that satisfies a set of requirements for the secure VM-vTPM migration and its performance is evaluated using different ciphers and VM RAM sizes.
A Security-Enhanced vTPM 2.0 for Cloud Computing
- Computer ScienceICICS
- 2017
The vTPM 2.0 system and the security-enhanced protection mechanism are designed and implemented for the first time and the key distribution and protection mechanism is presented.
Bootstrapping Trust in a "Trusted" Virtualized Platform
- Computer ScienceCYSARM@CCS
- 2019
This work puts forward a formal model for virtualization systems and trusted virtualized platforms and shows that if a Goldeneye attack is successful, it would allow a verifier to establish trust in an untrustworthy platform.
Secure Attestation of Virtualized Environments
- Computer ScienceSEC
- 2020
An approach that provides adequate security and is easy to implement but is prone to relay attacks is identified, which outperforms the other approach for a small number of VMs, as used in network devices and embedded systems.
Trusted Virtual Domains - Design, Implementation and Lessons Learned
- Computer ScienceINTRUST
- 2009
The need for and the realization of intra-TVD access control, a hypervisor abstraction layer for simplified TVD management, necessary components of a TVD policy and revocation issues, and the prototype implementation for the Xen and L4 microkernel platforms are discussed.
References
SHOWING 1-10 OF 34 REFERENCES
Terra: a virtual machine-based platform for trusted computing
- Computer ScienceSOSP '03
- 2003
We present a flexible architecture for trusted computing, called Terra, that allows applications with a wide range of security requirements to run simultaneously on commodity hardware. Applications…
Design and Implementation of a TCG-based Integrity Measurement Architecture
- Computer ScienceUSENIX Security Symposium
- 2004
This work shows that many of the Microsoft NGSCB guarantees can be obtained on today's hardware and today's software and that these guarantees do not require a new CPU mode or operating system but merely depend on the availability of an independent trusted entity, a TPM for example.
Xen and the art of virtualization
- Computer ScienceSOSP '03
- 2003
Xen, an x86 virtual machine monitor which allows multiple commodity operating systems to share conventional hardware in a safe and resource managed fashion, but without sacrificing either performance or functionality, considerably outperform competing commercial and freely available solutions.
Safe Hardware Access with the Xen Virtual Machine Monitor
- Computer Science
- 2007
The new Safe Hardware Interface is presented, an isolation architecture used within the latest release of Xen which allows unmodified device drivers to be shared across isolated operating system instances, while protecting individual OSs, and the system as a whole, from driver failure.
Secure Data Management in Trusted Computing
- Computer ScienceCHES
- 2005
This paper identifies shortcomings of the TCG specification related to the availability of sealed data during software and hardware life cycles, i.e., software update or/and hardware migration and proposes both software andHardware solutions to resolve these problems.
Building a MAC-based security architecture for the Xen open-source hypervisor
- Computer Science21st Annual Computer Security Applications Conference (ACSAC'05)
- 2005
We present the sHype hypervisor security architecture and examine in detail its mandatory access control facilities. While existing hypervisor security approaches aiming at high assurance have been…
Live migration of virtual machines
- Computer ScienceNSDI
- 2005
The design options for migrating OSes running services with liveness constraints are considered, the concept of writable working set is introduced, and the design, implementation and evaluation of high-performance OS migration built on top of the Xen VMM are presented.
Survey of virtual machine research
- Computer ScienceComputer
- 1974
The complete instruction-by-instruction simulation of one computer system on a different system is a well-known computing technique. It is often used for software development when a hardware base is…
QEMU, a Fast and Portable Dynamic Translator
- Computer ScienceUSENIX Annual Technical Conference, FREENIX Track
- 2005
QEMU supports full system emulation in which a complete and unmodified operating system is run in a virtual machine and Linux user mode emulation where a Linux process compiled for one target CPU can be run on another CPU.
Guest Editors' Introduction: Resource Virtualization Renaissance
- Computer ScienceComputer
- 2005
Virtualization technologies encompass a variety of mechanisms and techniques used to address computer system problems such as security, performance, and reliability by decoupling the architecture and…