Team for Research in
Ubiquitous Secure Technology

Minimal TCB code execution (Extended abstract)
J. M. McCune, B. Parno, A. Perrig, M. Reiter, A. Seshadri

Citation
J. M. McCune, B. Parno, A. Perrig, M. Reiter, A. Seshadri. "Minimal TCB code execution (Extended abstract)". Proceedings of the 2007 IEEE Symposium on Security and Privacy, May, 2007.

Abstract
We propose an architecture that allows code to execute in complete isolation from other software while trusting only a tiny software base that is orders of magnitude smaller than even minimalist virtual machine monitors. Our technique also enables more meaningful attestation than previous proposals, since only measurements of the security-sensitive portions of an application need to be included. We achieve these guarantees by leveraging hardware support provided by commodity processors from AMD and Intel that are shipping today.

Electronic downloads


(No downloads are available for this publication.)
Citation formats  
  • HTML
    J. M. McCune, B. Parno, A. Perrig, M. Reiter, A. Seshadri.
    <a href="http://www.truststc.org/pubs/192.html"
    >Minimal TCB code execution (Extended
    abstract)</a>, Proceedings of the 2007 IEEE Symposium
    on Security and Privacy, May, 2007.
  • Plain text
    J. M. McCune, B. Parno, A. Perrig, M. Reiter, A. Seshadri.
    "Minimal TCB code execution (Extended abstract)".
    Proceedings of the 2007 IEEE Symposium on Security and
    Privacy, May, 2007.
  • BibTeX
    @inproceedings{McCuneParnoPerrigReiterSeshadri07_MinimalTCBCodeExecutionExtendedAbstract,
        author = {J. M. McCune and B. Parno and A. Perrig and M.
                  Reiter and A. Seshadri},
        title = {Minimal TCB code execution (Extended abstract)},
        booktitle = {Proceedings of the 2007 IEEE Symposium on Security
                  and Privacy},
        month = {May},
        year = {2007},
        abstract = {We propose an architecture that allows code to
                  execute in complete isolation from other software
                  while trusting only a tiny software base that is
                  orders of magnitude smaller than even minimalist
                  virtual machine monitors. Our technique also
                  enables more meaningful attestation than previous
                  proposals, since only measurements of the
                  security-sensitive portions of an application need
                  to be included. We achieve these guarantees by
                  leveraging hardware support provided by commodity
                  processors from AMD and Intel that are shipping
                  today.},
        URL = {http://www.truststc.org/pubs/192.html}
    }
    

Posted by Michael Reiter on 10 Mar 2007.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.