- 1、本文档共33页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
The Trusted Computing - Could it be… SATAN_
The Trusted Computing - Could it be…. SATAN? Y’all remember the Church Lady, right? Bruce Potter gdead@ Don’t Believe Anything I Say Do not believe in anything simply because you have heard it. Do not believe in anything simply because it is spoken and rumored by many. Do not believe in anything simply because it is found written in your religious books. Do not believe in anything merely on the authority of your teachers and elders. Do not believe in traditions because they have been handed down for many generations. But after observation and analysis, when you find that anything agrees with reason and is conducive to the good and benefit of one and all, then accept it and live up to it.” - Buddha By Day, Senior Associate for Booz Allen Hamilton By Night, Founder of The Shmoo Group and restorer of hopeless Swedish cars Overview -Two things to accomplish Make the case for trusted computing While dodging the beer bottles being thrown at me Demonstrate the TPM on a MacBook Release some code Sprinkle in some good arguments, and we’ve got ourselves a party A Brief History of InfoSec For at least 50 years, we’ve been trying to solve the information security problem However, at the same time, the problem keeps getting more complex In the meantime, it’s made security a profitable and sustainable industry (funny what happens when you chase an impossible dream) Current InfoSec Trends Defense in Depth The core problem is currently unsolvable… So why not throw a giant pile of bandaids at it With a slick phrase like “defense in depth” it even sounds responsible Access to systems == Access to data Boot disks are amazing things David Hulton et al have even taken malicious slave devices to a new level Transactions are trusted at a network level End to end security only exists in controlled environments So, How Did We Get Here? The roadmap for secure systems is described in Butler Lampson’s “Protection” paper /~lampson/09-Protection/WebPage.html “The original motivation for put
文档评论(0)