Loading…
Rootkit Resistant File-system based on TPM
Current method of computer security implementations are only software based. The future trend of security is shifting towards hardware and software based. We shall utilize the growing trend in security, the Trusted Platform Module (TPM) to prove that both hardware and software security implementatio...
Saved in:
Main Authors: | , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Current method of computer security implementations are only software based. The future trend of security is shifting towards hardware and software based. We shall utilize the growing trend in security, the Trusted Platform Module (TPM) to prove that both hardware and software security implementation is feasible and effective. We hence, choose to utilize TPM for prevention of file system rootkit persistence. Such is performed utilizing the data signing capability provided by the TPM's signing keys-thus the construction of the Rootkit Resistant File-system (RRF) based on TPM. We shall further demonstrate that our RRF is comparable with Tripwire. |
---|---|
DOI: | 10.1109/ICCAIE.2010.5735084 |