Title :
Security evaluation of embedded hardware implementation
Author :
Karter, Ledina ; Ferhati, Linda ; Tafa, Igli ; Saatciu, Denis ; Fejzaj, Julian
Author_Institution :
EUT, Tirana, Albania
Abstract :
The main objective of this paper is the evaluation of security features in TPM implementations. Nowadays security is very important, especially for those who keep important information on their computers, such as passwords, bank accounts and certificates. TPM can help to keep the information protected from possible adversaries. In order to trust in a TPM-enabled computing device, one must be sure that it really secures the stored information in it. In this paper are investigated security features and concerns of TPM and also is performed an evaluation of the advantages and disadvantages its shows. The evaluation is based on different experimental results which include TPM implementation and capabilities involving various software and computers equipped with embedded TPM.
Keywords :
cryptography; data protection; embedded systems; trusted computing; TPM capabilities; TPM implementation; TPM-enabled computing device; embedded hardware implementation; information protection; information secures; security evaluation; security feature evaluation; trusted platform module; Computers; Encryption; Hardware; Linux; Software; Computer Attacks; Cryptographic and Protection Capabilities; Security Features; Time Stamping; Trusted Platform Module;
Conference_Titel :
Science and Information Conference (SAI), 2015
Conference_Location :
London
DOI :
10.1109/SAI.2015.7237307