Questions tagged [trusted-computing]

Trusted computing is a technology to enhance security of computer systems. The key component is the Trusted Platform Module (TPM). As a hardware device it provides features that software can't. Trusted computing is developed and promoted by the Trusted Computing Group (TCG).

Trusted Computing is a technology to enhance security of computer systems. The key component is the Trusted Platform Module (TPM). As a hardware device it provides features that software can't. Trusted computing is developed and promoted by the Trusted Computing Group (TCG).

54 questions
1
vote
1 answer

TPM: PCR_Event VS PCR_Extend

The TCG's "Trusted Platform Module Library Specification" states that both commands PCR_Event and PCR_Extend eventually cause an update to the indicated PCR (and its banks). In addition to that we know that a PCR can only be reset or extended. So…
Alex
  • 35
  • 6
1
vote
2 answers

Android Dev: Run custom code in the Trusted Execution Environment (TEE), extending the Keystore

I am relatively new to Android development and have never used the Android Keystore before. But I am familiar with the (theoretical) concepts. My problem is that I have to generate and store a secret key and later use this key to run cryptographic…
user2690527
  • 1,729
  • 1
  • 22
  • 38
1
vote
1 answer

Intel SGX: Reproduce enclave measurement from enclave binary

I have a question about the enclave measurement in Intel SGX. Judging by the SignTool source code (and high-level description in the manual), it seems like measurement involves loading the enclave file (ELF or PE). But the result of loading varies…
qweruiop
  • 3,156
  • 6
  • 31
  • 55
1
vote
1 answer

Intel SGX remote attestation sample code

I'm trying to run the remote attestation sample code in the Intel SGX SDK. I always get error "Error, call sgx_ra_get_msg1 fail [wmain]." I think it's because that the sgx_ra_init(&g_sp_pub_key, b_pse, p_context) function returns a zero value…
WooShin
  • 11
  • 2
1
vote
1 answer

How to call arm assembly from C source files?

I have found a number of good tutorials on compiling assembly code with Android NDK. But they do not have information on how to call assembly instructions from C source files, which I believe is possible. I think I have seen similar tutorials for it…
user3326293
  • 817
  • 1
  • 14
  • 37
1
vote
1 answer

Why do I get nonstandard responses from the TPM Through TBS?

I have a C++ program to do a basic TPM_GetCapabilities Through TPM Base Services and the Windows 7 SDK. I've setup the program below int _tmain(int argc, _TCHAR* argv[]) { TBS_CONTEXT_PARAMS pContextParams; TBS_HCONTEXT …
Yablargo
  • 3,520
  • 7
  • 37
  • 58
1
vote
0 answers

What can "a TXT-lockable BAR is above 4GB" mean?

I'm trying to launch a flicker session (http://flickertcb.sourceforge.net/) that uses the GETSEC[SENTER] instruction on Intel machines in order to launch a "Dynamic Root of Trust" environment. The error I'm getting ("a TXT-lockable BAR is above…
A. Nilsson
  • 539
  • 3
  • 5
  • 19
1
vote
1 answer

Which PCR can be extended by our own code?

As there are 24 PCR's in TPM 1.2 specification. Some of these PCRs are reserved and cannot be extended by user's code. Below are the PCR Index their PCR Usage CRTM, BIOS and Platform Extensions Platform Conguration Option ROM Code Option ROM…
Geek
  • 363
  • 1
  • 7
  • 14
1
vote
1 answer

Remotely Verifying the Application in execution

Is it possible to prove to the remote party that the application I am running in my system is the same as I am claiming that I am running using DRTM or SRTM? If yes then How?
Geek
  • 363
  • 1
  • 7
  • 14
0
votes
0 answers

For TPM 1.2, using tpm-tools the tpm_sealdata does not work after a reboot

I am trying to encrypt and store a key in the TPM 1.2 chip and for that I am using tpm-tools package provided by TrouSerS. I can used tpm_sealdata and tpm_unsealdata when I first take ownership. But when I reboot the system, both the sealing and…
0
votes
0 answers

Reconstruction of PCR register from ASCII measurements

I have simple linux IMA measurements and I am trying to reconstruct PCR registers for remote verification. 10 4347bff321748edf90d2dc40edaa1b54c7eaaa16 ima-ng sha256:de2e7b1bc7a2aed4e5866d3655d1041206c27caf376ee81bfc4012e8225e0e7c…
0
votes
0 answers

How is Open Mobile API (OMAPI) different from Android Keystore API and Android StrongBox?

I've heard that to access Secure Element (SE) basic functionality (i.e., to use it only as a container to store keys), one can use Keystore or Strongbox. However, SE's advanced functionality can be accessed only via OMAPI. Is that so? Finally, is…
Shakalakah
  • 33
  • 4
0
votes
1 answer

Secure management of local counter on Android

I'd like to develop a simple Android application that authorizes access to a server in the following way: The app stores a local counter t_count of access tokens which initializes at t_count = X; Whenever the user wants to access the server, the…
0
votes
2 answers

Can we prevent EC2 instance from accessing the plain text data when using the AWS Nitro Enclave for encryption?

I am working on a project where the data that comes from the customer through a REST API should be encrypted before sending it to the database. To do that, we need to use AWS Nitro Enclave to do the encryption. So Nitro Enclave will receive the data…
0
votes
0 answers

Undefined reference to Tss2_TctiLdr_Initialize

I am trying to use the Command Transmission Interface from the Trusted Software Stack for the TPM 2.0 and I cannot seem to get this library loaded. Any use gives an "undefined reference" error. Had the same problem when using the ESAPI from TSS as…