Loading…

Rootkit Resistant File-system based on TPM

Current method of computer security implementations are only software based. The future trend of security is shifting towards hardware and software based. We shall utilize the growing trend in security, the Trusted Platform Module (TPM) to prove that both hardware and software security implementatio...

Full description

Saved in:
Bibliographic Details
Main Authors: Teh Jia Yew, bin Samsudin, K, Udzir, N I
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Current method of computer security implementations are only software based. The future trend of security is shifting towards hardware and software based. We shall utilize the growing trend in security, the Trusted Platform Module (TPM) to prove that both hardware and software security implementation is feasible and effective. We hence, choose to utilize TPM for prevention of file system rootkit persistence. Such is performed utilizing the data signing capability provided by the TPM's signing keys-thus the construction of the Rootkit Resistant File-system (RRF) based on TPM. We shall further demonstrate that our RRF is comparable with Tripwire.
DOI:10.1109/ICCAIE.2010.5735084