Title :
Establishing Chain of Trust in Reconfigurable Hardware
Author :
Eisenbarth, Thomas ; Güneysu, Tim ; Paar, Christof ; Sadeghi, Ahmad-Reza ; Wolf, Marko ; Tessier, Russell
Author_Institution :
Horst Gortz Inst. for IT Security, Bochum
Abstract :
Facing ubiquitous threats like computer viruses, trojans and theft of intellectual property, Trusted computing (TC) is an emerging technology towards building trustworthy computing platforms. A recent initiative by the trusted computing group (TCG) specifies the use of trusted platform modules (TPM), currently implemented as dedicated, cost-effective crypto-chips mounted on the main board of computer systems. In this paper we propose implementations for TC functionalities based on more flexible and versatile approaches for reconfigurable and embedded architectures. Our approach allows for (i) a scalable design and update of TPM functionalities in embedded systems, (ii) the integration of the TPM hardware in the chain of trust to bind applications to the underlying TPM and the reconfigurable hardware, and (iii) the design of vendor independent TPMs.
Keywords :
reconfigurable architectures; security of data; reconfigurable hardware; trusted computing; trusted platform module; Authentication; Cryptography; Embedded system; Fabrics; Field programmable gate arrays; Hardware; Information security; Pervasive computing; Protection; Reconfigurable logic;
Conference_Titel :
Field-Programmable Custom Computing Machines, 2007. FCCM 2007. 15th Annual IEEE Symposium on
Conference_Location :
Napa, CA
Print_ISBN :
978-0-7695-2940-0
DOI :
10.1109/FCCM.2007.23