Skip to main content

TS

Trusted ⇐ trustworthy ⇐ proof – position paper

Authors

Gernot Heiser

NICTA, Sydney, Australia
UNSW, Australia


    Open Kernel Labs, Sydney, Australia

Abstract

Trusted computing is important, but we argue that it remains an illusion as long as the underlying trusted computing base (TCB) is not trustworthy. We observe that present approaches to trusted computing do not really address this issue, but are trusting TCBs which have not been shown to deserve this trust. We argue that only mathematical proof can ensure the trustworthiness of the TCB. In short: trust requires trustworthiness, which in turn requires proof. We also show that this is achievable.

BibTeX Entry

  @inproceedings{Heiser_08a,
    publisher        = {Vieweg+Teubner},
    isbn             = {978-8348-0794-6},
    author           = {Gernot Heiser},
    month            = jul,
    editor           = {D. Gawrock and H Raimer and A.-R. Sadeghi and C. Vishik},
    year             = {2009},
    title            = {Trusted {$\Leftarrow$} Trustworthy {$\Leftarrow$} Proof -- Position Paper},
    booktitle        = {Proceedings of the  2nd Conference on Future of Trust in Computing},
    pages            = {55--59},
    address          = {Berlin, Germany}
  }

Download

Served by Apache on Linux on seL4.
Served by Apache on Linux on seL4.