TY - GEN
T1 - Development of m-TMS for trusted computing in mobile cloud
AU - Kim, Hyun Woo
AU - Song, Eun Ha
AU - Kim, Jun Ho
AU - Park, Sang Oh
AU - Jeong, Young Sik
PY - 2012
Y1 - 2012
N2 - In this rapidly changing IT society, computer system security is very crucial. This system security applies not only to individuals' computer systems but also to cloud environments. "Cloud" concerns operations on the web; therefore it is exposed to a lot of risks and security of its spaces where data are stored is vulnerable. Accordingly, in order to reduce factors of threat to security, the TCG (Trusted Computing Group) proposed a highly reliable platform based on a semiconductor-chip, TPM(Trusted Platform Module). Therefore, this paper proposes a m-TMS (Mobile Trusted Monitoring System) that monitors trusted state of a computing environment on which TPM chip-based TPB (Trusted Platform Board) is mounted and the current status of its system resources in a mobile device environment resulting from the development of network service technology. m-TMS is provided to users so that system resources of CPU, RAM, and process, the objects of monitoring in a computer system, may be monitored. Moreover, converting and detouring of single entities like PC or target addresses, which are attack pattern methods that pose a threat to computer system security, are combined. Branch instruction trace function is monitored using a BiT (Branch Instruction Trace) Profiling tool through which processes attacked or those suspected of being attacked may be traced, enabling users to actively respond.
AB - In this rapidly changing IT society, computer system security is very crucial. This system security applies not only to individuals' computer systems but also to cloud environments. "Cloud" concerns operations on the web; therefore it is exposed to a lot of risks and security of its spaces where data are stored is vulnerable. Accordingly, in order to reduce factors of threat to security, the TCG (Trusted Computing Group) proposed a highly reliable platform based on a semiconductor-chip, TPM(Trusted Platform Module). Therefore, this paper proposes a m-TMS (Mobile Trusted Monitoring System) that monitors trusted state of a computing environment on which TPM chip-based TPB (Trusted Platform Board) is mounted and the current status of its system resources in a mobile device environment resulting from the development of network service technology. m-TMS is provided to users so that system resources of CPU, RAM, and process, the objects of monitoring in a computer system, may be monitored. Moreover, converting and detouring of single entities like PC or target addresses, which are attack pattern methods that pose a threat to computer system security, are combined. Branch instruction trace function is monitored using a BiT (Branch Instruction Trace) Profiling tool through which processes attacked or those suspected of being attacked may be traced, enabling users to actively respond.
KW - BiT Profiling
KW - Mobile Cloud
KW - System Behavior Monitoring
KW - TPB
KW - TPM
UR - http://www.scopus.com/inward/record.url?scp=84861139936&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-30767-6_31
DO - 10.1007/978-3-642-30767-6_31
M3 - Conference contribution
AN - SCOPUS:84861139936
SN - 9783642307669
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 361
EP - 369
BT - Advances in Grid and Pervasive Computing - 7th International Conference, GPC 2012, Proceedings
T2 - 7th International Conference on Advances in Grid and Pervasive Computing, GPC 2012
Y2 - 11 May 2012 through 13 May 2012
ER -