Improvements in Data Storage Process in TPM for Integrity Management
Abstract
Some electronic devices have native solutions to guarantee their integrity, one example is the TPM (Trusted Platform Module), a chip dedicated to security. In virtual machines, a vTPM (Virtual Trusted Platform Module) can be found, which, when anchored with the TPM, can take advantage of the security robustness that the TPM has. However, there is an obstacle to this strategy, and that is where the objective of this work arises. The vTPM, when generating multiple requests to the TPM, can generate an overload on the chip and, to solve this as well as multiple requests not necessarily coming from the vTPM, the work proposes the implementation of a request scheduler.
References
M. Zimmerman. (2018) Virtual trusted platform module for shielded vms: security in plaintext. Acessado em 17 de maio de 2024. [Online]. Available: [link]
M. Eckel and T. Riemann, “Userspace software integrity measurement,” in Proceedings of the 16th International Conference on Availability, Reliability and Security, 2021, pp. 1–11.
Trusted computing group. Acessado em 17 de maio de 2024. [Online]. Available: [link]
M. Tassyany, R. Sarmento, E. Falcão, R. Gomes, and A. Brito, “Um mecanismo de aprovisionamento de identidades para microsserviços baseado na integridade do ambiente de execução,” in Anais do XXXIX Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. SBC, 2021, pp. 714–727.
R. Perez, R. Sailer, L. van Doorn et al., “vtpm: virtualizing the trusted platform module,” in Proc. 15th Conf. on USENIX Security Symposium, 2006, pp. 305–320.
J. Schmitz, J. Loew, J. Elwell, D. Ponomarev, and N. Abu-Ghazaleh, “Tpm-sim: A framework for performance evaluation of trusted platform modules,” in Proceedings of the 48th Design Automation Conference, 2011, pp. 236–241.
Trusted virtual data center. Acessado em 17 de maio de 2024. [Online]. Available: [link]
