Waltzing the bear, or: A trusted virtual security module

1Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Cryptographic key material needs to be protected. Currently, this is achieved by either pure software based solutions or by more expensive dedicated hardware security modules. We present a practical architecture to project the security provided by the Trusted Platform Module and Intel Trusted eXecution Technology on a virtual security module. Our approach uses commodity personal computer hardware to offer integrity protection and strong isolation to a security module which implements a compact security API that has been fully verified. Performance results suggest that our approach offers an attractive balance between speed, security and cost. © Springer-Verlag Berlin Heidelberg 2013.

Cite

CITATION STYLE

APA

Toegl, R., Reimair, F., & Pirker, M. (2013). Waltzing the bear, or: A trusted virtual security module. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7868 LNCS, pp. 145–160). https://doi.org/10.1007/978-3-642-40012-4_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free