Monday, August 13, 2007 -- NOTE SPECIAL DAY
12:0 pm - 1:00 pm
PLACE: CIC 2101
Technische Universität, Dresden
OSLO: Improving the security of Trusted Computing
An increasing number of Computing Platforms with a Trusted Platform Module (TPM) are sold. Applications using them such as Microsoft's Bitlocker are getting more and more common these days. In this talk I will present bugs and ways to attack trusted computing systems based on a static root of trust. I propose to use the dynamic root of trust feature of newer x86 processors as this shortens the trust chain, can minimize the Trusted Computing Base of applications and is less vulnerable to TPM and BIOS attacks. To support this claim I implemented the Open Secure LOader (OSLO), the first publicly available bootloader based on AMDs skinit instruction.
Bernhard Kauer is a PhD student in Prof. Hermann Haertig's Operating Systems Group at TU Dresden, conducting research in the field of trusted computing (OpenTC) and kernel resource management (L4.sec).
Seminar Host: Adrian Perrig
Visitor Coordinator: Lydia Corrado
or visit http://www.pdl.cmu.edu/SDI/