{"title":"1CD Linux上的可信引导和平台信任服务","authors":"K. Suzaki, K. Iijima, T. Yagi, Nguyen Anh Quynh","doi":"10.1109/APTC.2008.23","DOIUrl":null,"url":null,"abstract":"We developed 1CD Linux which shows the benefit of trusted computing. It includes Trusted Boot and Platform Trust Services, which use a secure chip \"TPM\" and are hardware rooted trust. The integrity of platform and vulnerability of packages are verified by the remote attestation. The 1CD Linux includes Union File System, which keeps the keys of TPM and the updated applications for next boot time. User can customize the OS and verify the vulnerability. We also offer the virtual machine \"Xen-HVM\" which supportsa virtual TPM. The virtual machine does not depend on a physical TPM and makes possible to try the feasibility of trusted computing on many PCs. The ready-to-use environment makes easy to understand the trusted computing and increases the awareness.","PeriodicalId":159186,"journal":{"name":"2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference","volume":"33 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Trusted Boot and Platform Trust Services on 1CD Linux\",\"authors\":\"K. Suzaki, K. Iijima, T. Yagi, Nguyen Anh Quynh\",\"doi\":\"10.1109/APTC.2008.23\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We developed 1CD Linux which shows the benefit of trusted computing. It includes Trusted Boot and Platform Trust Services, which use a secure chip \\\"TPM\\\" and are hardware rooted trust. The integrity of platform and vulnerability of packages are verified by the remote attestation. The 1CD Linux includes Union File System, which keeps the keys of TPM and the updated applications for next boot time. User can customize the OS and verify the vulnerability. We also offer the virtual machine \\\"Xen-HVM\\\" which supportsa virtual TPM. The virtual machine does not depend on a physical TPM and makes possible to try the feasibility of trusted computing on many PCs. The ready-to-use environment makes easy to understand the trusted computing and increases the awareness.\",\"PeriodicalId\":159186,\"journal\":{\"name\":\"2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference\",\"volume\":\"33 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-10-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/APTC.2008.23\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/APTC.2008.23","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Trusted Boot and Platform Trust Services on 1CD Linux
We developed 1CD Linux which shows the benefit of trusted computing. It includes Trusted Boot and Platform Trust Services, which use a secure chip "TPM" and are hardware rooted trust. The integrity of platform and vulnerability of packages are verified by the remote attestation. The 1CD Linux includes Union File System, which keeps the keys of TPM and the updated applications for next boot time. User can customize the OS and verify the vulnerability. We also offer the virtual machine "Xen-HVM" which supportsa virtual TPM. The virtual machine does not depend on a physical TPM and makes possible to try the feasibility of trusted computing on many PCs. The ready-to-use environment makes easy to understand the trusted computing and increases the awareness.