Gedare-Csphd

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Sunday, 25 April 2010

Rant of the Week (ROTW): Trusted vs. Trustworthy

Posted on 12:18 by Unknown
A common theme in computer security is "trust" -- and the implication that trust is equal to security is prevalent in quite a bit of literature and propaganda.  Although Wikipedia isn't the greatest source, it does provide some insight into popular beliefs, and makes for a good vehicle for this discussion.  Consider the article on the Trusted Platform Module, which starts with:
In computing, Trusted Platform Module (TPM) is both the name of a published specification detailing a secure cryptoprocessor that can store cryptographic keys that protect information, as well as the general name of implementations of that specification, often called the "TPM chip" or "TPM Security Device"

So what? Follow the links, and we get a little closer to some understanding:
A secure cryptoprocessor is a dedicated computer on a chip or microprocessor for carrying out cryptographic operations, embedded in a packaging with multiple physical security measures, which give it a degree of tamper resistance.


And there is the key: tamper resistance. Security is a much-bandied word in the computing field, but the notion that just because something is trusted it is secure is ridiculous. But there is also a subtle distinction between tamper resistance and tamper proof. My view is that you need to be tamper proof to be secure in the physical attack model, and tamper resistance just gets you security against amateur hackers.  Unfortunately, it is prohibitively expensive to manufacture tamper proof electronics, and even worse is that tamper proofing the system only gives you physical security--you still need a trustworthy system underneath the tamper proof layer.  That said, the TPM provides a very good approach to building security, but it is not perfect.

Assuming the TPM is trustworthy, one useful application of the TPM is to get a trusted boot, which provides a good basis for building secure systems.  However, without tamper proofing the TPM, there is no guarantee that a sophisticated attacker won't be able to circumvent the security mechanisms.  An example of this is the Reset attack, demonstrated against an early version of the TPM specification.  These types of attacks show that even if the module is "trusted", it can still be manipulated to violate the security benefits of its use.  This applies even if the module is trustworthy, because these attacks manipulate the system interface to the module itself, which could also be a threat with a tamper proof system.

Some technical but approachable blog articles have been written over at the Invisible Things lab that address trusted technology and trusted boot, with an eye to the practical:
  • ITL: Attacking Intel TXT
  • ITL: Microsoft Bitlocker and Trusted Boot
The moral of the story is that trusted does not imply trustworthy, and that security is more complicated than trust alone.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in computer security, rant | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Generating interrupts with a gem5 device
    Today I extended my work of adding a device to gem5 by causing the device to generate an interrupt. Interrupts seem to be architecture-spec...
  • RTEMS Modular Task Scheduler
    As I mentioned in my last post , this past summer I participated in the Google Summer of Code by working on the RTEMS project. I have hopef...
  • Extensible Data Structures in C
    A lot of systems programming code is done in C, primarily because of the exposure of explicit memory addresses, but for other reasons too. ...
  • On brevity
    Concise and compact diction is an art that I appreciate more each day. A taste of brevity comes in savoring a phrase that captures an idea w...
  • Spacecraft Flight Software Workshop
    MMS: a NASA mission that will fly RTEMS Last week I attended the Workshop on Spacecraft Flight Software (FSW 2011) at the Johns Hopkins Uni...
  • Post 0
    I've been thinking about starting a blog for awhile, but unlike some of my compulsions, I actually followed through this time.  Although...
  • OT: Apple Pie
    The holidays really give me a hankering for pie.  I made some apple pies awhile back after going apple picking, and I took a couple photos. ...
  • Software product country of origin (COO)
    Late last year, US Customs ( CBP ) issued an advisory ruling regarding how to determine the COO for software products when software is deve...
  • Critical Bugs and Quality Assurance
    Sebastian Huber recently posted a nasty RTEMS bug and fix. While simple, the bug manifested in their application as an increase in one task...
  • Understanding Energy and Power
    Lately I've been looking at power as an evaluation metric for my research. Power consumption has always been an important design concer...

Categories

  • cerification
  • computer architecture
  • computer security
  • COO
  • cooking
  • gem5
  • git
  • government
  • GSoC
  • hacking
  • LaTeX
  • life
  • linux
  • lolcat
  • Lua
  • mentorsummit
  • OOP
  • open source software
  • rant
  • research
  • RTEMS
  • science
  • sisu
  • space
  • thesis
  • VC
  • visualization
  • work

Blog Archive

  • ►  2013 (12)
    • ►  October (1)
    • ►  May (3)
    • ►  April (1)
    • ►  February (4)
    • ►  January (3)
  • ►  2012 (12)
    • ►  November (1)
    • ►  October (6)
    • ►  August (1)
    • ►  May (2)
    • ►  April (2)
  • ►  2011 (29)
    • ►  December (5)
    • ►  November (3)
    • ►  October (2)
    • ►  September (2)
    • ►  August (2)
    • ►  July (5)
    • ►  June (2)
    • ►  May (2)
    • ►  April (2)
    • ►  March (2)
    • ►  February (1)
    • ►  January (1)
  • ▼  2010 (19)
    • ►  December (2)
    • ►  November (2)
    • ►  July (3)
    • ►  June (2)
    • ►  May (3)
    • ▼  April (2)
      • Rant of the Week (ROTW): Trusted vs. Trustworthy
      • Scripting with Lua
    • ►  March (5)
Powered by Blogger.

About Me

Unknown
View my complete profile