University of Cambridge > > Computer Laboratory Security Seminar > Towards open trusted computing frameworks

Towards open trusted computing frameworks

Add to your list(s) Download to your calendar using vCal

If you have a question about this talk, please contact Saar Drimer.

This talk will summarise the results of, and motivation for, my master’s thesis, which looked at the feasibility of a trusted computing framework built from entirely open components. Each component was required to be as inspect-able and verifiable as possible, and therefore be trusted by its users.

I will discuss in some detail a novel insertion attack against certain trusted computing frameworks built upon the Trusted Computing Group’s Trusted Computing Module. Our insertion attack makes use of a vulnerability that arises due to the architecture of the TPM itself, and was published at COMPSAC 2006 .


Matt Barrett graduated from the University of Auckland’s Computer Science Department ( with a MSc (Hons, 1st Class) in 2005. His thesis was titled ‘Towards an Open Trusted Computing Framework,’ available at Since then, he has been living and working in London. Previous research has included Microsoft’s now defunct Next-Generation Secure Computing Base.

This talk is part of the Computer Laboratory Security Seminar series.

Tell a friend about this talk:

This talk is included in these lists:

Note that ex-directory lists are not shown.


© 2006-2015, University of Cambridge. Contact Us | Help and Documentation | Privacy and Publicity