ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Detail

Conference Paper Implementation of a TCG-based Trusted Computing in Mobile Device
Cited 6 time in scopus Download 1 time Share share facebook twitter linkedin kakaostory
Authors
Su Gil Choi, Jin Hee Han, Jeong Woo Lee, Jong Pil Kim, Sung Ik Jun
Issue Date
2008-09
Citation
International Conference on Trust, Privacy and Security in Digital Business (TrustBus) 2008 (LNCS 5185), v.5185, pp.18-27
Language
English
Type
Conference Paper
DOI
https://dx.doi.org/10.1007/978-3-540-85735-8_3
Project Code
08MS2500, Development of a common security core module for supporting secure and trusted service in the next generation mobile terminals, Jun Sungik
Abstract
Our implementation is aimed at estimating the possibility of employing TCG-based trusted computing mechanisms, such as verifying the code-integrity of executables and libraries at load-time and remote attestation, in mobile devices. Considering the restrained resource in mobile device, the experimentation shows promising results, thereby enabling these mechanisms to be used as a basic building block for a more secured mobile service. To this end, we add a new feature of integrity measurement and verification to Wombat Linux kernel and Iguana embedded OS. We also implement attestation agents, Privacy CA, and TCG Software Stack. © Springer-Verlag Berlin Heidelberg 2008.
KSP Keywords
Embedded OS, Integrity Measurement, Linux kernel, Mobile devices, Mobile services, Software Stack, Trusted computing, basic building blocks, measurement and verification, remote attestation