System-Level Design Methodologies for Telecommunication 2013
DOI: 10.1007/978-3-319-00663-5_6
|View full text |Cite
|
Sign up to set email alerts
|

From Hardware Security Tokens to Trusted Computing and Trusted Systems

Abstract: As security attacks are becoming an everyday real-life scenario, security engineers must invent more intricate countermeasures to deal with them. Infusion of strong security to a computer system by recruiting specialized hardware tokens has already an established foothold in the modern information technology (IT) world. However, these tokens nowadays must be appropriately adapted to ensure not only strong security but also trust. Modern security specialists believe that the ultimate security goal is not only t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 24 publications
0
4
0
Order By: Relevance
“…By expanding this logic, an isolated OS has the ability to operate on such a VM. If access to this VM is under the control of a Trusted Computing Base (TCB) program on the CPU, the OS can be considered secure and isolated from any other untrusted VM running [23]. This process of an employed TCB running over the device hardware as a hypervisor structure has various implementation problems in practice, like hardware constraints, system real time behavior, scheduling and access control rights.…”
Section: Using Virtual Environmentsmentioning
confidence: 99%
See 3 more Smart Citations
“…By expanding this logic, an isolated OS has the ability to operate on such a VM. If access to this VM is under the control of a Trusted Computing Base (TCB) program on the CPU, the OS can be considered secure and isolated from any other untrusted VM running [23]. This process of an employed TCB running over the device hardware as a hypervisor structure has various implementation problems in practice, like hardware constraints, system real time behavior, scheduling and access control rights.…”
Section: Using Virtual Environmentsmentioning
confidence: 99%
“…Security Monitoring loggers installed on such devices need to rely on an execution environment that is capable of supporting the ADS sensors' functionality and that is protected from malicious entities. To achieve high security in legacy devices, it has been proposed in several works to introduce external security tokens that can be considered trusted [23,[28][29][30]. Having that in mind, extending the work in [2], we propose a Hardware Security Token (HST) that could be used as an external security element on legacy devices in order to instill a level of trust on collected ADS sensor logs and provide a series of security services to an associated host device and user.…”
Section: Proposed Approach For Legacy Systemsmentioning
confidence: 99%
See 2 more Smart Citations