outline purpose design implementation market conclusion presentation outline
Post on 21-Dec-2015
220 views
TRANSCRIPT
outline
•Purpose
•Design
•Implementation
•Market
•Conclusion
presentation Outline
purpose
•Provide both a hardware & software solution to improve computer security
•Evaluate trust computing (i.e. platform module)
•Produce a marketable product
purpose
purpose
•Computer vulnerabilities
•Goal:
Authenticate all channels of communication to secure the machine
problem
•Memory
•Graphics
•Chipset
•Processor
hardware design
• Attestation
• Encryption
• Authentication
•Domain manager
•Trusted platform module (TPM)
•Sealed storage
•Key instructions: SENTER, SEXIT
software design
Launch Sequence:
•SENTER- chipset & CPU
•Loads code (AC) into register
•SEXIT- clear memory
software design (cont’d)
implementationimplementation
Primary client: corporate
•Secure financial & propriety information
•Cost-effective security
•Relationship with Intel between IT and developers
Secondary client: consumer
•Prevent compromised performance
•Real-measure of security (vs firewalls, service packs, etc)
•User-friendly
marketmarket
• Workstations
• Servers
• OEMs (Dell, Gateway, etc)
• Consumer computers
conclusionsconclusions
• Enhances Intel processors, chipsets, and platforms
• Creates a hardware that protects data from software-based attacks
• Implements well-known security properties
referencesacknowledgements
• Intel, http://www.intel.com/technology/security/
• Professor King
• University of the Pacific