Launch Time Application Security: The Trusted Approach
Journal: International Journal of Science and Research (IJSR) (Vol.2, No. 3)Publication Date: 2013-03-05
Authors : Renu Mary Daniel; Angela Francis; Vinodh Ewards S. E.;
Page : 168-172
Keywords : Trust; Trusted Platform Module; TPM; Integrity Measurement; Sealing; Application Security;
Abstract
In the day to day lives of human beings commodity computers are increasingly used to access banking transactions, sending sensitive e-mails, accessing personal and confidential information from remote systems, where it becomes the prime necessity to assure the user that security sensitive operations executes always on secure and trusted state of system. The emergence of the Trusted Platform Module (TPM) has added to the security feature of a computer. Much work has been done to ensure the integrity of the system using a TPM. But what happens when the applications running on top of the Trusted System are malicious? The sensitive data provided to such applications becomes vulnerable for exploit. We propose a system which notifies the user if the integrity of an application is violated and stops it. The system makes use of the functionalities of the TPM chip.
Other Latest Articles
- Statistical Analysis of DCT Coefficients for Ascertaining Ears Biometrics
- The Danger of HIV/AIDS Prevalence among Street Children on the Public in Kenya: Experiences from Eldoret Municipality
- Evaluation of Carbon Stocks of Some Freshwater Fishes of Manipur
- Family based Factors Leading to Street Children Phenomenon in Kenya
- Spectroscopic and DNA Binding Studies on a Novel Water Soluble Binuclear Copper (II) Schiff base
Last modified: 2021-06-30 20:14:29