Waltzing the Bear, or: A Trusted Virtual Security Module

Ronald Tögl, Florian Reimair, Martin Pirker

Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

Abstract

Cryptographic key material needs to be protected. Currently, this is achieved by either pure software based solutions or by more expensive dedicated hardware security modules. We present a practical architecture to project the security provided by the Trusted Platform Module and Intel Trusted eXecution Technology on a virtual security module.

Our approach uses commodity personal computer hardware to offer integrity protection and strong isolation to a security module which implements a compact security API that has been fully verified. Performance results suggest that our approach offers an attractive balance between speed, security and cost.
Original languageEnglish
Title of host publicationPublic Key Infrastructures, Services and Applications
Subtitle of host publication9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers
Place of PublicationBerlin; Heidelberg
PublisherSpringer Verlag
Pages145-160
ISBN (Print)978-3-642-40011-7
DOIs
Publication statusPublished - 2012
EventEuropean PKI Workshop: Research and Applications - Pisa, Italy
Duration: 13 Sept 201214 Sept 2012

Publication series

NameLecture Notes in Computer Science
PublisherSpringer Verlag
Volume7868

Conference

ConferenceEuropean PKI Workshop: Research and Applications
Country/TerritoryItaly
CityPisa
Period13/09/1214/09/12

Fields of Expertise

  • Information, Communication & Computing

Treatment code (Nähere Zuordnung)

  • Application

Fingerprint

Dive into the research topics of 'Waltzing the Bear, or: A Trusted Virtual Security Module'. Together they form a unique fingerprint.
  • EU - SEPIA - Secure, Embedded Platform with advanced Process Isolation and Anonymity Capabilities

    Winter, J. (Co-Investigator (CoI)), Dietrich, K. (Co-Investigator (CoI)), Pirker, M. (Co-Investigator (CoI)), Hein, D. (Co-Investigator (CoI)), Bloem, R. (Co-Investigator (CoI)), Tögl, R. (Co-Investigator (CoI)) & Podesser, S. (Co-Investigator (CoI))

    1/06/1031/05/13

    Project: Research project

  • acTVsM! - Advanced Cryptographic Trusted Virtual Security Module

    Tögl, R. (Co-Investigator (CoI)), Pirker, M. (Co-Investigator (CoI)), Niederl, A. (Co-Investigator (CoI)) & Bloem, R. (Principal Investigator (PI))

    1/04/0931/03/11

    Project: Research project

  • Trusted Computing

    Niederl, A. (Co-Investigator (CoI)), Lipp, P. (Co-Investigator (CoI)), Hein, D. (Co-Investigator (CoI)), Vejda, T. (Co-Investigator (CoI)), Podesser, S. (Co-Investigator (CoI)), Tögl, R. (Co-Investigator (CoI)), Dietrich, K. (Co-Investigator (CoI)), Bratko, H. (Co-Investigator (CoI)), Winter, J. (Co-Investigator (CoI)) & Pirker, M. (Co-Investigator (CoI))

    1/10/0515/07/19

    Project: Research area

Cite this