The Community for Technology Leaders
2007 IEEE Symposium on Security and Privacy (SP '07) (2007)
Berkeley, California
May 20, 2007 to May 23, 2007
ISSN: 1081-6011
ISBN: 0-7695-2848-1
pp: 267-272
Jonathan M. McCune , Carnegie Mellon University
Bryan Parno , Carnegie Mellon University
Adrian Perrig , Carnegie Mellon University
Michael K. Reiter , Carnegie Mellon University
Arvind Seshadri , Carnegie Mellon University
ABSTRACT
We propose an architecture that allows code to execute in complete isolation from other software while trusting only a tiny software base that is orders of magnitude smaller than even minimalist virtual machine monitors. Our technique also enables more meaningful attestation than previous proposals, since only measurements of the security-sensitive portions of an application need to be included. We achieve these guarantees by leveraging hardware support provided by commodity processors from AMD and Intel that are shipping today.
INDEX TERMS
Operating systems, Computer architecture, Information security, Virtual machine monitors, Hardware, Kernel, Cryptography, Proposals, Sea measurements, Application software
CITATION

J. M. McCune, B. Parno, A. Perrig, M. K. Reiter and A. Seshadri, "Minimal TCB Code Execution," 2007 IEEE Symposium on Security and Privacy (SP '07)(SP), Berkeley, California, 2008, pp. 267-272.
doi:10.1109/SP.2007.27
93 ms
(Ver 3.3 (11022016))