Questions tagged [trusted-computing]

Trusted computing is a technology to enhance security of computer systems. The key component is the Trusted Platform Module (TPM). As a hardware device it provides features that software can't. Trusted computing is developed and promoted by the Trusted Computing Group (TCG).

Trusted Computing is a technology to enhance security of computer systems. The key component is the Trusted Platform Module (TPM). As a hardware device it provides features that software can't. Trusted computing is developed and promoted by the Trusted Computing Group (TCG).

54 questions
3
votes
0 answers

Use TPM for signing on Windows without taking ownership

I have a follow-up question of sorts to this question: How to encrypt bytes using the TPM (Trusted Platform Module) I am using Windows 10 for an embedded solution. I would like to use the TPM to store signing keys and perform signatures. However, I…
3
votes
1 answer

TBOOT: DMAR not found

I have also posted this on the tboot-devel@lists.sourceforge.net mailing list, but I descided to post here as well to get more exposure to this issue. I'm trying to get tboot to work, but I'm getting nowhere fast. I've installed tboot…
A. Nilsson
  • 539
  • 3
  • 5
  • 19
3
votes
1 answer

Documentations for tboot?

Is there any Documentation to understand what tboot does and how tboot works? http://sourceforge.net/projects/tboot/
Geek
  • 363
  • 1
  • 7
  • 14
3
votes
1 answer

APIs for accessing Intel TXT (trusted execution mode) or AMD SVM?

Do any current operating systems (windows, linux, BSD) provide drivers that enable user-mode programs to execute partly in the trusted execution mode (isolated from everything else running on the computer)? If so, where can the documentation be…
zvrba
  • 24,186
  • 3
  • 55
  • 65
3
votes
1 answer

Trusted Computing, iPad, Certifying Unmodified Apps

Since Apple controls the entire hardware/software stack, is it possible to obtain the following (through some type of trusted computing): the hardware certifies that the software is genuine, non-jail broken iOS iOS certifies to my server that the…
user1311390
2
votes
1 answer

How to load and use a persistent symmetric key in the TPM?

I simply want to store one 32 bytes long symmetric key persistently in the NV storage of the TPM and after a power-cycle, use it (without getting it out of the TPM) to encrypt small-sized data. I've tried to do that in two different ways: 1) Create…
Alex
  • 35
  • 6
2
votes
1 answer

How to get the Quote from an Intel SGX Enclave

I am developing a trusted computing project with the help of an Intel SGX Enclave. To verify an Enclave i need the Quote generated by the Quoting-Enclave. I know how it works theoretically and how to start an Enclave. But I am not able to find any…
Cookie T
  • 21
  • 2
2
votes
0 answers

Running jTSS in Eclipse

I am trying to run the Trusted Computing API JSR321 in Eclipse by following the tutorial provide at Getting Started with JSR321 in Windows 7. After successfully enabling my TPM (manufacturer: STM & version: 1.2). I tried to run the code given in…
Abdur Rahman
  • 353
  • 5
  • 16
2
votes
1 answer

TPM PCR Generation in Windows

I have a machine with TPM and I am running windows 7 on it. I have a piece of code and I want to get run it and get the PCR register values at that time. How can I do that? Secondly, if i run the same code on other machine can I get the same PCR…
Geek
  • 363
  • 1
  • 7
  • 14
2
votes
1 answer

What is the value of TSS_WELL_KNOWN_SECRET

I want to run a script which calls tpm_sealdata many times and I don't want to enter the SRK password each time. In the man page I found this: -z, --well-known Use TSS_WELL_KNOWN_SECRET (20 zero bytes) as the SRK password. You will not be…
Hayro
  • 126
  • 2
  • 12
1
vote
1 answer

Go lang tpm2 library PCR extend, PCR read inconsistency

I am using the tpm 2 library to write (extend) and read from a PCR. However, I have observed that the values written to the PCR do not match the values read from it after writing. This suggests an inconsistency. Can someone help me with with this…
1
vote
0 answers

Can Android app on ChromeOS create a KeyPair that is at least SECURITY_LEVEL_TRUSTED_ENVIRONMENT?

I'm trying to find out if creating hardware backed secure keys are possible inside an Android app running on a Chromebook. I'm asking because to my knowledge, all Android apps on ChromeOS runs on some kind of virtualised environment and might not…
1
vote
0 answers

Support of Intel's MLE / DRTM in long mode

I am currently working on an x86 operating system that is booted the way similar to tboot. A lot of the logic is copied from tboot. Currently the OS' boot sequence is: BIOS launches the OS using multiboot standard, OS runs in protected mode…
Eric Stdlib
  • 1,292
  • 1
  • 18
  • 32
1
vote
1 answer

Should switching between RSASSA-PSS and RSASSA-PKCS1-v1_5 be mindful of other parameters?

I am not sure if I should ask this here or in Security Stackexchange perhaps. In any event, I was recently working on RSA signatures using a TPM and came across an issue where I switched the padding scheme from RSASSA-PKCS1-v1_5 to RSASSA-PSS. I…
Veksi
  • 3,556
  • 3
  • 30
  • 69
1
vote
1 answer

file path of each hash in measurements with TPM

I enable the TPM in a ubuntu which is installed in vmware workstation. and then i install tpm2-tools with the following command: sudo apt-get install tpm2-tools then i parse the TPM event log which is in…
capstonene
  • 179
  • 11