Application Attacks

Lastly, Trusted Computing aims at improving the security of the whole platform, not only by providing the building blocks at the lower level of the computing architecture, but also by directly improving the security of applications. Software support such as the TCG Software Stack (TSS) or other security services implemented on top of Trusted Computing capabilities can be used to invoke cryptographic primitives and security management functions directly or create and securely store encryption, decryption, or signing keys. Each application can not only become more robust by relying on robust implementations of these capabilities, but also rely on the underlying software, and, in particular, on the operating system, to enforce security policies and thus prevent unexpected modifications or access.

The difficulty with application attacks comes from the huge diversity of existing applications that not only implement different (and sometimes conflicting) features, but also implement them in a variety of ways that introduce an added level of complexity. We can only list a few of the possible attack vectors here; being exhaustive without entirely devoting this book to this topic would be difficult. Furthermore, the numerous new security capabilities provided by Trusted Computing can be applied in multiple ways to prevent these attack vectors and protect applications.

Was this article helpful?

0 0
The Ultimate Computer Repair Guide

The Ultimate Computer Repair Guide

Read how to maintain and repair any desktop and laptop computer. This Ebook has articles with photos and videos that show detailed step by step pc repair and maintenance procedures. There are many links to online videos that explain how you can build, maintain, speed up, clean, and repair your computer yourself. Put the money that you were going to pay the PC Tech in your own pocket.

Get My Free Ebook

Post a comment