Remote-launch: Borrowing secure TCB for constructing trustworthy computing platform

  • Jeehong Kim
  • , Taehyoung Kim
  • , Inhyeok Kim
  • , Changwoo Min
  • , Young Ik Eom

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Commodity operating systems have become extremely large to provide a lot of services, and then their vulnerability has been targeted by malicious attack. In order to increase security in operating system, there have been many attempts to reduce the size of Trust Computing Base (TCB). However, most of the approaches have applicability limitations due to hypervisor vulnerability and additional hardware requirements. To address these limitations, instead of reducing TCB size, we propose a novel approach to enhance the security of the system. We hide secure TCB for sensitive applications, and thus build an isolated secure environment using a wellequipped infrastructure. For evaluation, we implement a prototype, called Remote-Launch, which runs a security-sensitive process on the borrowed secure TCB.

Original languageEnglish
Title of host publicationComputer Science and Its Applications - Ubiquitous Information Technologies
EditorsHwa Young Jeong, Ivan Stojmenovic, James J. Park, Gangman Yi
PublisherSpringer Verlag
Pages823-829
Number of pages7
ISBN (Electronic)9783662454015
DOIs
StatePublished - 2015
Event6th FTRA International Conference on Computer Science and its Applications, CSA 2014 - Guam, United States
Duration: 17 Dec 201419 Dec 2014

Publication series

NameLecture Notes in Electrical Engineering
Volume330
ISSN (Print)1876-1100
ISSN (Electronic)1876-1119

Conference

Conference6th FTRA International Conference on Computer Science and its Applications, CSA 2014
Country/TerritoryUnited States
CityGuam
Period17/12/1419/12/14

Keywords

  • Confidentiality
  • Hybrid platform
  • Integrity
  • TCB

Fingerprint

Dive into the research topics of 'Remote-launch: Borrowing secure TCB for constructing trustworthy computing platform'. Together they form a unique fingerprint.

Cite this