Design and implementation of a TCG-based integrity measurement architecture

Reiner Sailer, Xiaolan Zhang, Trent Jaeger, Leendert Van Doorn

Research output: Contribution to conferencePaperpeer-review

948 Scopus citations

Abstract

We present the design and implementation of a secure integrity measurement system for Linux. All executable content that is loaded onto the Linux system is measured before execution and these measurements are protected by the Trusted Platform Module (TPM) that is part of the Trusted Computing Group (TCG) standards. Our system is the first to extend the TCG trust measurement concepts to dynamic executable content from the BIOS all the way up into the application layer. In effect, we show that many of the Microsoft NGSCB guarantees can be obtained on today's hardware and today's software and that these guarantees do not require a new CPU mode or operating system but merely depend on the availability of an independent trusted entity, a TPM for example. We apply our trust measurement architecture to a web server application where we show how our system can detect undesirable invocations, such as rootkit programs, and that our measurement architecture is practical in terms of the number of measurements taken and the performance impact of making them.

Original languageEnglish (US)
StatePublished - 2004
Event13th USENIX Security Symposium - San Diego, United States
Duration: Aug 9 2004Aug 13 2004

Conference

Conference13th USENIX Security Symposium
Country/TerritoryUnited States
CitySan Diego
Period8/9/048/13/04

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Information Systems
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'Design and implementation of a TCG-based integrity measurement architecture'. Together they form a unique fingerprint.

Cite this