We present a system in which a user leverages a personal mobile device to establish trust in a public computing device, or kiosk, prior to revealing personal information to that kiosk. We have designed and implemented a protocol by which the mobile device determines the identity and integrity of the software loaded on the kiosk. A similar protocol allows a kiosk owner to verify that the kiosk has loaded only approved software. Our system combines a number of emerging security technologies, including the Trusted Platform Module, the Integrity Measurement Architecture, and new support in x86 processors for establishing a dynamic root of trust. We focus on allowing the user to personalize the computing environment on the kiosk by running his own virtual machine.
By: Scott Garriss; Ramón Cáceres; Stefan Berger; Reiner Sailer; Leendert van Doorn; Xiaolan Zhang
Published in: RC24169 in 2007
LIMITED DISTRIBUTION NOTICE:
This Research Report is available. This report has been submitted for publication outside of IBM and will probably be copyrighted if accepted for publication. It has been issued as a Research Report for early dissemination of its contents. In view of the transfer of copyright to the outside publisher, its distribution outside of IBM prior to publication should be limited to peer communications and specific requests. After outside publication, requests should be filled only by reprints or legally obtained copies of the article (e.g., payment of royalties). I have read and understand this notice and am a member of the scientific community outside or inside of IBM seeking a single copy only.
Questions about this service can be mailed to reports@us.ibm.com .