ABSTRACT
Hardware has been long considered as the source and root of trust in computing, but the nature of its trust characteristics and views on trust technologies have evolved over time. The infancy of hardware security and trust, decades ago, emerged in the days when security attacks were limited in number and sophistication, the computing environment was relatively simple and homogeneous, the population of connected users was small, and the use cases where computing played a key role were very far from ubiquitous. Today, the situation is diametrically different from the early days of hardware trust and trusted computing. The talk will provide an overview of the evolution of technology and use cases in this area, examine persistent challenges, analyze mistakes we made along the way, look into the intersections with adjacent areas of research and practice and finally outline some promising directions for the next generation of trusted technologies.
Index Terms
- In Search of Trust: 30 Years of Evolution of Trusted Computing and Hardware Security
Recommendations
Formal Definitions for Trust in Trusted Computing
UIC-ATC '10: Proceedings of the 2010 Symposia and Workshops on Ubiquitous, Autonomic and Trusted ComputingTrust, the most fundamental concept in Trusted Computing, is a pervasive notion and, as such, has been studied thoroughly in a variety of different fields. Based on a survey of trust and security, two formal definitions for trust in Trusted Computing ...
Reconfigurable trusted computing in hardware
STC '07: Proceedings of the 2007 ACM workshop on Scalable trusted computingTrusted Computing (TC) is an emerging technology towards building trustworthy computing platforms. The TrustedComputing Group (TCG) has proposed several specifications to implement TC functionalities by extensions to common computing platforms, ...
High Time for Trusted Computing
Attacks on computer systems are increasing in number and seriousness. One way to deal with this threat is to create systems that support trusted computing—having a high degree of trust that the computer is behaving as you expect and only as you expect. ...
Comments