Skip to content
Justin Dawson edited this page Feb 19, 2015 · 9 revisions

References

Papers, websites, and various flotsam that we need to keep track of:

Other Systems

Verification

TPM

  • Introduction to the TPM 1.2 - Excellent introduction to the TPM and protocols that use it.
  • Berlios TPM Emulator - Advocates a software-based TPM emulator and describes its usage. Also reinforces concepts concerning the fundamental structure and functionality of the TPM.
  • Verifying the TPM 1.2 - Our paper on TPM verification. Includes a description of the CA-based attestation protocol.
  • Attacking Intel Trusted Execution Technology (paper and slides) - Invisible Things Lab paper on how to attack TPM-based trusted boot environments.
  • vTPM: Virtualizing the Trusted Platform Module - IBM people talking about doing pretty much exactly what we want to do in Xen-- chaining trust to a vTPM running in Xen so guest Dom U's can use it.
  • vTPM Configuring in Xen 4.3 - Describes how this guy got a vTPM up and running for Guest DomU's in: "Ubuntu 12.4 (as host), Xen 4.3, Linux Kernel 3.7.1 for Dom0, and Linux Kernel 3.7.9 for DomU kernel."
  • Virtual Trusted Platform Module - A short overview of the design of implementing a vTPM in Xen

Clone this wiki locally