Fact-checked by Grok 2 weeks ago
References
-
[1]
Definition of NGSCB | PCMag(Next Generation Secure Computing Base) A Windows security platform from Microsoft introduced in 2002, and originally called "Palladium.
-
[2]
A Logical Account of NGSCB - Microsoft ResearchSep 1, 2004 · As its name indicates, NGSCB aims to be the Next-Generation Secure Computing Base. As envisioned in the context of Trusted Computing ...
-
[3]
A Trusted Open Platform - Microsoft ResearchJul 1, 2003 · Microsoft's next-generation secure computing base extends personal computers to offer mechanisms that let high-assurance software protect ...
-
[4]
Next-Generation Secure Computing Base - BetaArchive WikiNov 7, 2023 · Microsoft is designing NGSCB to enable the development of programs and systems that will make it easy for machine owners to prevent unauthorized ...
-
[5]
Secure Computing: NGSCB's Journey and Windows Security ImpactThe Next-Generation Secure Computing Base (NGSCB) aimed to improve privacy, boost security, and reinforce system integrity for users of the Windows operating ...
-
[6]
Trusted Computing: Promise and Risk | Electronic Frontier FoundationOct 1, 2003 · Trusted computing initiatives propose to solve some of today's security problems through hardware changes to the personal computer.
-
[7]
[PDF] Next Generation Secured Computing BaseTrusted Computing (TC) and Next Generation Secured Computing Base (NGSCB) ... NGSCB helps to protect users and provide them a very secure platform of computing.
-
[8]
Microsoft kills Next-Generation Secure Computing Base - Ars TechnicaMay 5, 2004 · On Tuesday, Microsoft executives confirmed that NGSCB will be canned. ... Update: Microsoft is now saying that NGSCB is not dead after all.
-
[9]
Next Generation Secure Computing Base - Alchetron.comOct 7, 2024 · Development of NGSCB began in 1997 after Peter Biddle conceived of new ways to protect content on personal computers. Biddle would enlist the ...
-
[10]
Peter Biddle | Microsoft Wiki | FandomPeter Nicholas Biddle (born December 22, 1966) joined Microsoft in 1990. Biddle was one of the first authors to describe the darknet, a founder of SDMI, ...Missing: origins | Show results with:origins
-
[11]
[PDF] (TCPA) Main Specification Version 1.1b Published by the Trusted ...The Trusted Computing Group wishes to thank members of the PKI, PC Specific and Conformance ... This document is an industry specification that enables trust in ...Missing: 1999-2003 precursors
-
[12]
Trusted Computing FAQ TCPA / Palladium / NGCSB / TCGMicrosoft has renamed Palladium NGSCB - for `Next Generation Secure ... An exchange with Peter Biddle, technical director of Palladium, from the cryptography list ...
-
[13]
[PDF] TCG Specification Architecture Overview - Trusted Computing GroupAug 2, 2007 · History ... TCG was formed in spring 2003 and has adopted the specifications developed by the Trusted Computing Platform Alliance. (TCPA).Missing: 1999-2003 precursors
-
[14]
[PDF] TRUSTED COMPUTING GROUP (TCG) TIMELINE2003. Trusted Computing Group is announced with membership of 14 companies, including Promoters and board members. AMD, Hewlett-Packard, IBM, ...Missing: TCPA history 1999-2003 precursors
-
[15]
[PDF] Microsoft Palladium: A Business OverviewIn addition, Palladium will offer enterprise customers significant new benefits for network security and content protection. This white paper: • Examines how ...Missing: project announcement
-
[16]
Old Bill's police tactics | Windows - The GuardianJul 3, 2002 · The plans, code-named Palladium, aim to tackle the long-standing problems of computer security, online privacy and theft of copyright material ...<|separator|>
-
[17]
Why Intel loves Palladium - The RegisterJun 25, 2002 · Intel has come out in support for Microsoft's Secure PC initiative, dubbed Palladium. The Palladium pitch is security first - no more spam or viruses - and DRM ...
-
[18]
Palladium Details - ActiveWin.comJul 8, 2002 · Changes will be required to the CPU, the chipset (on the motherboard), the input devices (e.g. keyboard), and the video output devices (graphics ...
-
[19]
Channel Positive About Microsoft Palladium Security Project - CRNMicrosoft is working with chip partners Intel, AMD and others on a technology code-named Palladium that would make security and privacy ...
-
[20]
Bad publicity, clashes trigger MS Palladium name changeMicrosoft has abandoned the Palladium name, in favour of the (no doubt deliberately) snooze-provoking "Next Generation Secure Computing Base."
-
[21]
WinHEC: Microsoft expects slow adoption for NGSCB - InfoWorldMay 8, 2003 · NGSCB is a combination of new hardware and software that Microsoft says will boost PC security but that critics fear could be a scourge for user ...
-
[22]
Virus alert about Blaster worm and its variants - Windows ServerJan 15, 2025 · Your computer is not vulnerable to the Blaster worm if you installed the 823980 security patch (MS03-026) before August 11, 2003 (the date that ...
-
[23]
Blaster (computer worm) - WikipediaThe worm was first noticed and started spreading on August 11, 2003. The rate that it spread increased until the number of infections peaked on August 13, 2003.
-
[24]
SoBig.F breaks virus speed records - Aug. 22, 2003 - CNNAug 22, 2003 · The SoBig.F outbreak, first detected Monday, began 10 days after the Blaster worm (which itself infected an estimated 500,000 users) and has ...
-
[25]
Sobig - WikipediaThe Sobig Worm was a computer worm that infected millions of Internet-connected, Microsoft Windows computers in August 2003.
-
[26]
WinHEC: Microsoft revisits NGSCB security plan - Network WorldNGSCB was demonstrated for the first time a year ago at the 2003 WinHEC. Attendees at Microsoft's Professional Developers Conference in Los ...
-
[27]
Bill Gates Unveils Next Wave of Windows PC Innovation at WinHEC ...May 6, 2003 · NGSCB is an innovative software/hardware architecture for a future version of Windows that will deliver new capabilities for security, privacy ...Missing: 2004 | Show results with:2004
-
[28]
Microsoft Shelves NGSCB Project As NX Moves To Center StageMay 5, 2004 · Microsoft announced the NGSCB plans for Longhorn at WinHEC 2003 and released NGSCB code in the Longhorn Developer Preview software ...
-
[29]
Microsoft Shelves NGSCB Project As NX Moves To Center StageMay 5, 2004 · After a year of tackling the Windows security nightmare, Microsoft has killed its Next-Generation Secure Computing Base (NGSCB) project and ...
- [30]
-
[31]
Microsoft: Full Steam Ahead for Palladium - OSnewsMay 6, 2004 · Wrong! Palladium was renamed to “Next Generation Secure Computing Base” or NGSCB for short. Check your facts before posting. For more ...
-
[32]
Whatever happened to Microsoft's DRM plan? - CNETJun 25, 2008 · NGSCB never did live up to its early promise--or what critics would have said was its early threat as a digital rights management tool that ...
-
[33]
[PDF] NGSCB: new stakes for smartcardsDec 6, 2003 · Q4 2003 - Q1 2004. NGSCB 1.0 with TPM 1.2. TPM 1.2. Page 4. 4. NGSCB - 06/2003. NGSCB principles. Trusted. Services. Other Services. NGSCB- ...
-
[34]
Trusted Computing Group - an overview | ScienceDirect TopicsVersion 1.2 of the TPM specification from the TCG was published in October 2003, and has since been revised. In this chapter, we will cover only the native ...
-
[35]
[PDF] Trusted Computing Group - T10.org– Existing familiar applications are using TCG/TPM through standard cryptographic APIs like MC-CAPI and PKCS #11. • TPM 1.2 Specification announced Nov. 5, 2003.
- [36]
-
[37]
TCG inside?: A note on TPM specification compliance - ResearchGateThe Trusted Computing Group (TCG) has addressed a new generation of computing platforms employing both supplemental hardware and software with the primary ...
-
[38]
How Trustworthy Is Trusted Computing?In NGSCB and La Grande, it is incorporated into the main CPU, thereby ... Intel will integrate LaGrande capabilities into future processors and chipsets.
-
[39]
[PDF] Trusted Computing - Black HatIntel LaGrande Technologies. • Strong Processor Isolation. • Secure path to IO ... • Intel CPUs have rings. • Kernel runs in Ring 0. • Apps run in Ring 3.
-
[40]
[PDF] Architecture for Protecting Critical Secrets in MicroprocessorsComputing Base (NGSCB) [24] and Intel's LaGrande [13] attempt to provide a more secure execution environment using curtained memory, separating the memory ...<|control11|><|separator|>
-
[41]
[PDF] Trusted Computing & Digital Rights Management – Theory & EffectsThe Nexus is not a complete operating system kernel; it only implements operating system services that are vital for preserving its integrity. This is to ...
-
[42]
Trusted Computing FAQ TC / TCG / LaGrande / NGSCB / Longhorn ...If Microsoft believes that your copy of Office is a pirate copy, and your local government moves to TC, then the documents you file with them may be unreadable.<|control11|><|separator|>
-
[43]
[PDF] Architecture for Tamper-Evident and Tamper-Resistant ProcessingIn Palladium, the Nexus is a trusted security kernel. Palladium protects software from software, but does not concern itself with physical attacks. Because ...
-
[44]
[PDF] Improved data confidentiality: an overview of NGSCBThis term paper goes through the hardware modification and new features, illustrates how the nexus kernel cooperates with the specialized hardware platform to ...
-
[45]
NGSCB Spells Better Security for Windows - eWeekJun 9, 2003 · Microsoft Corp.s NGSCB initiative aims to improve security in future versions of Windows by providing a fine-grained level of control over ...<|separator|>
-
[46]
What to expect from Microsoft's NGSCB plan - ComputerworldThe NGSCB provides a hardware-enforced, curtained memory space for the Nexus and NCAs such that trusted applications running in the curtained memory are not ...<|separator|>
-
[47]
Trusted Computing: Promise and Risk - EFF... Microsoft Next-Generation Secure Computing Base, or NGSCB. The NGSCB project specifies software changes that take advantage of the security benefits made ...
-
[48]
[PDF] TCPA and Palladium Outline 1 Why Trusted Computing PlatformsOct 17, 2002 · Curtained memory: the ability to segment the physical memory of the machine into standard and trusted modes. 4. Secure Input/Output: user ...
-
[49]
[PDF] TCPA and PalladiumTCPA and Palladium, two proposed hardware changes to the x86 architecture, hope to solve a number of current security issues on the open net. In this paper, we ...Missing: demos | Show results with:demos
-
[50]
[PPT] Title of the Presentation - MicrosoftMicrosoft's Next-Generation Secure Computing Base (NGSCB) is a new security technology for the Microsoft Windows platform. Uses both hardware and software to ...
-
[51]
[PDF] Next-Generation Secure Computing Base (NGSCB)*The Next-Generation Secure Computing Base (NGSCB) which formerly known as Palladium, is a software architecture designed by Microsoft which is expected to ...
-
[52]
[PDF] Attestation: Evidence and Trust - MITRE Corporationmean the process of transmitting a sequence of hashes of certain system compo- nents and a digital signature of that sequence; in Microsoft's “NGSCB” [6] it.
-
[53]
[PDF] Trustworthy Computing Systems View -- Current Systems View ...○ TPM contains the ability to attest the contents of a PCR ... Attestation – built on platform attestation ... ○TCG 1.2 is the basis for Microsoft NGSCB,.
-
[54]
[PDF] Property-based Attestation for Computing PlatformsThe most notable ef- fort is the Trusted Computing Group (TCG) and the Next- Generation Secure Computing Base (NGSCB). This tech- nology offers useful new ...
-
[55]
Trusted Platform Module (TPM) fundamentals - Microsoft LearnAug 15, 2025 · A TPM is a microchip designed to provide basic security-related functions, primarily involving encryption keys.
-
[56]
[PDF] Migrating Applications to NGSCB - Department of Computer Science– Agents use nexus facilities to seal (encrypt and sign) private data. – The ... – Some policy decisions are cached in the nexus for performance reasons ...
-
[57]
NGSCB demo at Windows Hardware Engineering ConferenceMay 7, 2003 · One of the demos featured a program grabbing text from notepad, then failing to do so on a secure application. Another took a trusted file from ...
-
[58]
Microsoft takes 'Palladium' on tour - InfoWorldJun 12, 2003 · In the first NGSCB demonstration at WinHEC, Microsoft showed how programs protected by the technology would not work if tampered with by an ...
- [59]
-
[60]
EP1582962A3 - System and method for protecting media content ...... Secure media path methods, systems, and architectures ... ngscb/documents/NGSCBhardware.doc> [retrieved on 20050829] * ... ngscb/documents ...
-
[61]
TCPA/TCG and NGSCB: Benefits and Risks for Users (HS-IKI-EA-04 ...DRM systems have privacy implications since the purpose is to keep track of users so as to know who is allowed what rights to certain content, and this ...<|control11|><|separator|>
-
[62]
[PDF] THE ECONOMIC BENEFITS OF REDUCING SOFTWARE PIRACYThe economic benefits would increase dramatically if piracy were to drop at a quicker pace. In France, for example, reducing the piracy rate by 10 points in ...Missing: NGSCB | Show results with:NGSCB
-
[63]
[PDF] DRM, Trusted Computing and Operating System ArchitectureAccording to Peinado, et al., (2004) the reason for this is that Microsoft's new. NGSCB trusted computing architecture requires a higher level of privilege ...
-
[64]
[PDF] Trusted Computing: Promise and RiskThe other well-known project is a hardware specification project run by a consortium originally called the Trusted Computing Platform Alliance, or TCPA. TCPA ...Missing: 1999-2003 precursors
-
[65]
[PDF] Cryptography and Competition Policy -Issues with 'Trusted Computing'This is popularly associated with Microsoft's 'Palladium' project, recently renamed 'NGSCB'. In this paper, I give an outline of the technical aspects of ' ...<|separator|>
-
[66]
[PDF] Principles of Remote Attestation ?A Two-Party Attestation Protocol. A simple protocol for attestation using a. TPM is given by Sailer, et. al. [31], as shown in Fig. 4, using terminology ...
-
[67]
(PDF) Principles of remote attestation - ResearchGateAug 6, 2025 · Remote attestation is the activity of making a claim about properties of a target by supplying evidence to an appraiser over a network.
-
[68]
NGSCB: A Trusted Open System - ResearchGateAug 7, 2025 · We describe Microsoft's Next Generation Secure Computing Base (NGSCB). The system provides high assurance computing in a manner consistent ...
-
[69]
Deception in double extortion ransomware attacks: An analysis of ...1. Data exfiltration: Overall, we find that in 50.4% of cases it was unknown whether data was exfiltrated, and in 49.6% of cases ...
-
[70]
[PDF] TPM 2.0 Part 1 - Architecture - Trusted Computing GroupMar 13, 2014 · The DRBG Protected Capability of a non-FIPS TPM consists of a DRBG mechanism that should comply with NIST Recommendation SP800-90 A, revised ...Missing: incidents | Show results with:incidents
-
[71]
What is a Trusted Platform Module (TPM)? - Trusted Computing GroupCurrently sitting at the heart of over 2 billion devices worldwide, the TPM can be considered a 'silent guardian', ensuring device security despite many people ...
-
[72]
Palladium on Display at WinHEC -- Redmondmag.comNGSCB is the next major step in Microsoft's Trustworthy Computing initiative. NGSCB is designed to protect users' critical data against viruses, Trojan ...
-
[73]
[PDF] USING NGSCB TO MITIGATE EXISTING SOFTWARE THREATSUsing this base, policy projection from one computer to another can occur, enabling Digital Rights Management (DRM) style applications to be built. It is ...
-
[74]
Developers get hands on Microsoft's upcoming security technologyOct 30, 2003 · NGSCB is a combination of hardware and software that creates a second operating environment within a PC that is meant to protect the system from ...
-
[75]
Can you trust your computer? - Microsoft VersusThe Electronic Frontier Foundation (www.eff.org) and Public Knowledge (www.publicknowledge.org) are campaigning against treacherous computing, and so is the FSF ...
-
[76]
Microsoft readies kit for security initiative | InfoWorldNGSCB is first intended for enterprise business and government use and will not make its way to home or consumer use for some time after that, said Suarez.<|separator|>
-
[77]
Microsoft delays bulk of next-generation security plan - ComputerworldApr 25, 2005 · NGSCB required changes to a PC's processor, chip set and graphics card. Microsoft has said that it got support for the changes from hardware ...
-
[78]
(PDF) Challenges for Trusted Computing - ResearchGateAug 9, 2025 · This has often led to criticisms that the administrative tasks involved in setting up trusted computing applications are too complicated, and ...<|separator|>
- [79]
-
[80]
[PDF] Proceedings of the 13th USENIX Security SymposiumIn effect, we show that many of the Microsoft. NGSCB guarantees can be obtained on today's hardware and today's software and that these guarantees do not ...
-
[81]
[PDF] How SMBs Can Benefit from the Security Protections of Windows 11Deploying BitLocker encryption with Windows 11 on all office PCs can be the difference between filing a police report for stolen property and filing a data ...
-
[82]
IBM Study Shows Data Breach Financial Impact Felt for YearsJul 30, 2019 · ... data breach costs on ... Extensive use of encryption was also a top cost-saving factor, reducing the total cost of a breach by $360,000.<|separator|>
-
[83]
Secure the Windows boot process | Microsoft LearnAug 18, 2025 · This article describes how Windows security features help protect your PC from malware, including rootkits and other applications.<|separator|>
-
[84]
Secure Boot Explained: Enhancing Linux Security and System IntegrityJan 3, 2024 · Secure Boot aims to prevent boot malware and rootkits by only allowing verified bootloaders and OS kernels to load during the boot process. This ...
-
[85]
Enable virtualization-based protection of code integrityAug 15, 2025 · Memory integrity and VBS improve the threat model of Windows and provide stronger protections against malware trying to exploit the Windows ...Missing: containment | Show results with:containment
-
[86]
Virtualization-based Security (VBS) - Microsoft LearnFeb 27, 2025 · VBS enforces restrictions to protect vital system and operating system resources, or to protect security assets such as authenticated user ...
-
[87]
How Windows uses the TPM | Microsoft LearnAug 15, 2025 · This article offers an overview of the TPM, describes how it works, and discusses the benefits that TPM brings to Windows and the cumulative security effect.
-
[88]
Truth and Fiction about Microsoft's 'Palladium' - CSO OnlineMar 10, 2004 · A few highly-publicized rants contained misleading and incorrect information that has led NGSCB to be maligned as a “digital rights management” ...
-
[89]
[PDF] How to Make Your Systems and Data Truly SecureMay 26, 2005 · –Longhorn (N.G.S.C.B.) incorporation in 2006. –Intel integration in ... • Secure Media Exchange. – Protection reaches beyond the PC ...
-
[90]
A comprehensive survey of hardware-based security techniques ...... security has gained prominence for its superior predictability, consistency, and ability to establish a strong root of trust compared to software-based ...
-
[91]
[PDF] A Logical Account of NGSCB. - IFIP Open Digital LibraryNGSCB (“Next-Generation Secure Computing Base”, formerly known as “Palla- dium”) integrates hardware and software components that aim to help in protecting ...
-
[92]
BitLocker Overview - Microsoft LearnJul 29, 2025 · BitLocker provides maximum protection when used with a Trusted Platform Module (TPM), which is a common hardware component installed on Windows ...BitLocker countermeasures · Configure BitLocker · BitLocker FAQ
-
[93]
Trusted Platform Module Technology Overview - Microsoft LearnAug 15, 2025 · This article describes the Trusted Platform Module (TPM) and how Windows uses it for access control and authentication.Troubleshoot the TPM · TPM fundamentals · How Windows uses the TPM
-
[94]
Secure boot | Microsoft LearnFeb 8, 2023 · Secure boot is a security standard developed by members of the PC industry to help make sure that a device boots using only software that is trusted by the ...
-
[95]
Blue Hat 2023 and UEFI Secure Boot - Vincent Zimmer's blogFeb 12, 2023 · Since NGSCB, with its “Trusted Applet” (TA) architecture ,was a mile too far both for privacy and application compatibility, LT and Pacifica ...
-
[96]
Credential Guard overview | Microsoft LearnFeb 25, 2025 · Credential Guard prevents credential theft attacks by protecting NTLM password hashes, Kerberos Ticket Granting Tickets (TGTs), and credentials stored by ...How Credential Guard works · How to configure Credential... · Additional mitigationsMissing: NGSCB curtained
-
[97]
Considerations and known issues when using Credential GuardApr 22, 2025 · Credential Guard doesn't block certificate-based authentication. For a more immediate, but less secure fix, disable Credential Guard.
-
[98]
Enable TPM 2.0 on your PC - Microsoft SupportMost PCs that have shipped in the last 5 years are capable of running Trusted Platform Module version 2.0 (TPM 2.0). TPM 2.0 is required to run Windows 11, ...
-
[99]
TPM recommendations | Microsoft LearnAug 15, 2025 · Beginning with Windows 10, version 1511, TPM 1.2 and 2.0 are supported. Paired with System Guard, TPM 2.0 provides enhanced security for ...
-
[100]
[PDF] Introduction to Trusted Execution Environments (TEE) – IY5606• Attempted by Microsoft as Next-Generation Secure Computing Base. (a.k.a. ... • TEEs may offer Isolated Execution, Secure Storage, Remote Attestation,.
-
[101]
[PDF] Analysis of TEE technologies as trust anchors - WebthesisThis was attempted by Microsoft with the Next-Generation Secure Computing Base ... of Trusted Execution Environment (TEE) as a technology that can “resists ...<|separator|>
-
[102]
[PDF] Intel SGX Explained - Cryptology ePrint ArchiveIntel SGX is a set of extensions for secure remote computation, aiming to provide integrity and confidentiality on computers with potentially malicious ...
-
[103]
Evolution Of AMD SEV - VPSBG.euMar 27, 2025 · In this article, we are going to be focusing on the evolution of AMD's SEV technology from SME to SEV-ES, SEV-SNP and Trusted I/O ...Missing: NGSCB | Show results with:NGSCB
-
[104]
Azure Attestation overview - Microsoft LearnApr 15, 2025 · Trusted Platform Modules (TPM) based attestation is critical to provide proof of a platform's state. A TPM acts as the root of trust and the ...Missing: NGSCB | Show results with:NGSCB
-
[105]
Azure Attestation Basic Concepts - Microsoft LearnApr 15, 2025 · Trust model defines the authorization model of attestation provider to define and update policy. Two models are supported – one based on ...
-
[106]
[PDF] CONFIDENTIAL COMPUTING PERFORMANCE WITH AMD SEV-SNPAMD testing shows that using Google Cloud N2D Confidential. VMs has a low impact on performance compared with standard N2D instances when running workloads ...
-
[107]
[PDF] Accelerate Innovation and Enhance Data Protection with Intel ...Intel Security Engines, like Intel SGX, protect data in use by creating isolated enclaves, preserving confidentiality and code integrity.
-
[108]
Trusted Computing GroupThe Trusted Computing Group (TCG) is a not-for-profit organization formed to develop, define and promote open, vendor-neutral, global industry specifications ...About TCG · Trusted Platform Module (TPM) · Events · Trusted Network
-
[109]
Design and Implementation of a TCG-based Integrity Measurement ...In effect, we show that many of the Microsoft NGSCB guarantees can be obtained on today's hardware and today's software and that these guarantees do not ...
-
[110]
[PDF] Trusted Platform Module 2.0 Library Part 0: IntroductionDec 20, 2024 · The TCG would like to acknowledge the special contribution of David Wooten in the development of the TPM. 2.0 architecture and documentation of ...