Linux with TCPA Integrity Measurement

This paper describes an end-to-end implementation of TCPA (Trusted Computing Platform Alliance) integrity measurement for Linux kernel. Integrity measurement of the kernel is done through a chaining of PCR (Platform Configuration Register) updates during the bootstrap process of the GRUB kernel loader. The measured integrity values can be reported to remote servers by a Java application that uses a digital signature containing the PCR values. As the hardware platform, we used a stock laptop computer (ThinkPad T30) that is TCPA-enabled.

By: Hiroshi Maruyama, Taiga Nakamura, Seiji Munetoh, Yoshiaki Funaki, Yuhji Yamashita

Published in: RT0507 in 2004

LIMITED DISTRIBUTION NOTICE:

This Research Report is available. This report has been submitted for publication outside of IBM and will probably be copyrighted if accepted for publication. It has been issued as a Research Report for early dissemination of its contents. In view of the transfer of copyright to the outside publisher, its distribution outside of IBM prior to publication should be limited to peer communications and specific requests. After outside publication, requests should be filled only by reprints or legally obtained copies of the article (e.g., payment of royalties). I have read and understand this notice and am a member of the scientific community outside or inside of IBM seeking a single copy only.

RT0507.pdf

Questions about this service can be mailed to reports@us.ibm.com .