Fact-checked by Grok 2 weeks ago
References
-
[1]
trusted computing base (TCB) - Glossary | CSRCDefinitions: Totality of protection mechanisms within a computer system, including hardware, firmware, and software, the combination responsible for enforcing a ...
-
[2]
[PDF] Trusted Computer System Evaluation Criteria ["Orange Book"]Oct 8, 1998 · The security-relevant portions of a system are referred to throughout this document as the Trusted Computing. Base (TCB). Systems representative ...<|control11|><|separator|>
-
[3]
[PDF] Evolving Information Technology Security StandardsIn the early 1980's, the Trusted Computer System Evaluation Criteria (TCSEC) was developed. This was commonly referred to as the orange book. As a result of ...
-
[4]
Trusted Computing Base (TCB) in Azure Confidential ComputingMay 7, 2025 · Trusted computing base (TCB) refers to all of a system's hardware, firmware, and software components that provide a secure environment.
-
[5]
[PDF] Thirty Years Later: Lessons from the Multics Security EvaluationAlmost thirty years ago a vulnerability assessment of. Multics identified significant vulnerabilities, despite the fact that Multics was more secure than ...
-
[6]
[PDF] Computer Security Technology Planning Study (Volume I)Oct 8, 1998 · This report presents a research and devel opment plan to guide the work leading to the achievement of secure multilevel computer systems for the ...Missing: 1971 | Show results with:1971
-
[7]
History - Common Criteria... ISO/IEC 15408 standard in 1999. The ISO version corresponds to the version 2.1 of the Common Criteria document edited by the Common Criteria Management Board.
-
[8]
[PDF] TPM Main Part 1 Design Principles TCG PublishedMar 1, 2011 · Version. Date. Description. Rev 50. Jun 2003. Started 30 Jun 2003 by David Grawrock. First cut at the design principles. Rev 52. Jul 2003.
-
[9]
information security policy - Glossary | CSRCDefinitions: Aggregate of directives, regulations, rules, and practices that prescribes how an organization manages, protects, and distributes information.
-
[10]
What is a trusted computing base (TCB)? - TechTargetJan 10, 2022 · The TCB acts as the reference monitor that works at the boundary between the trusted and untrusted domains of a computing system. It functions ...
-
[11]
discretionary access control (DAC) - Glossary | CSRCAn access control policy that is enforced over all subjects and objects in an information system where the policy specifies that a subject that has been ...
-
[12]
[PDF] USE OF THE TRUSTED COMPUTER SYSTEM EVALUATION ...The TCSEC [4] was not made a DoD standard until 1985 and was slow to be adopted into policies and directives of the individual services. Part of the reason was ...
-
[13]
Part 1 - Foundations of Computer Security - Paul KrzyzanowskiTrusted Computing Base and Supply Chain Security. Every secure system depends on a Trusted Computing Base ... If the TCB is compromised, the entire system is at ...
-
[14]
What is a Trusted Computing Base? - Red Hat Emerging TechnologiesJun 18, 2021 · A Trusted Computing Base (TCB) refers to all system components critical to establishing and maintaining the security of a system, serving as ...
-
[15]
[PDF] Trusted Trustworthy ProofJul 16, 2008 · Trusted computing without a trustworthy TCB is a phantasy. Initiatives such as the TCG's trusted platform module aim at providing a trust anchor ...
-
[16]
NVD - CVE-2016-5195### Summary of CVE-2016-5195 (Dirty COW)
-
[17]
Linux Kernel Vulnerability - CISAOct 21, 2016 · US-CERT is aware of a Linux kernel vulnerability known as Dirty COW (CVE-2016-5195). Exploitation of this vulnerability may allow an attacker ...Missing: trusted computing base
-
[18]
[PDF] Trusted Computer System Evaluation Criteria(TCSEC)The TCSEC defines 6 evaluation classes identified by the rating scale from lowest to highest: D, C1, C2, B1,. B2, B3, and A1. An evaluated computer product ...
-
[19]
[PDF] seL4: Formal Verification of an OS Kernel - acm sigopsseL4, a third-generation microkernel of L4 prove- nance, comprises 8,700 lines of C code and 600 lines of assembler. Its performance is comparable to other ...
-
[20]
Linux kernel source expands beyond 40 million linesJan 26, 2025 · ... Linux kernel sources would expand beyond 40 million lines early this year. Linux 6.13 was released early in January 2025, with 39,819,522 lines ...
-
[21]
[PDF] Microkernel Architecture and SecurityMonolithic Kernel vs. Microkernel. 9. Fine-grained components. Static ... TCB is larger in size. TCB is smaller in size. If one component fails, the entire ...
-
[22]
[PDF] Hardware Enforcement of Application Security Policies Using ...To avoid including page table handling code in the trusted computing base, the processor's MMU is disabled while executing in monitor mode. 2.3 OS overview.
-
[23]
[PDF] Secure Computing using Certified Software and Trusted HardwareDec 14, 2017 · A central question addressed by this thesis is how the trusted hardware primitives can be used safely to build the trusted components of modern ...
-
[24]
Trusted Platform Module (TPM) Summary | Trusted Computing GroupTPM (Trusted Platform Module) is a computer chip (microcontroller) that can securely store artifacts used to authenticate the platform (your PC or laptop).
-
[25]
Trusted Computing Base Recovery - IntelOct 9, 2025 · Trusted Computing Base (TCB) Recovery is a process that restores the integrity and functionality of the TCB after a compromise.Missing: implications | Show results with:implications
-
[26]
[PDF] NIST.IR.8320.pdfConsequently, the underlying software must be part of the Trusted Computing Base (TCB). In shared environments, customers are forced to trust that the entities ...
-
[27]
[PDF] Strong and Efficient Cache Side-Channel Protection using ... - USENIXAug 16, 2017 · We presented Cloak, a new technique that defends against cache side-channel attacks using hardware trans- actional memory. Cloak enables the ...
-
[28]
[PDF] NIST SP 800-147, BIOS Protection GuidelinesOn most trusted computing architectures, the BIOS boot block serves as the computer system's CRTM because this firmware is implicitly trusted to bootstrap ...
-
[29]
[PDF] Security Recommendations for Hypervisor Deployment - CSRCOct 20, 2014 · • All hypervisor components that form part of the Trusted Computing Base (TCB) must be included under the scope of the Tboot mechanism so ...
-
[30]
[PDF] Application Container Security GuideThis publication explains the potential security concerns associated with the use of containers and provides recommendations for addressing these concerns.
-
[31]
[PDF] Trusted Platform Module (TPM) Use Cases - DoDNov 6, 2024 · TPM use cases include asset management, hardware supply chain security, boot integrity, device identification, authentication, encryption, and ...
-
[32]
The Protection of Information in Computer SystemsInvited Paper. Abstract. This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification.
-
[33]
[PDF] Pre-defined packages of security requirements November 2022 CC ...Nov 20, 2022 · the Common Criteria for Information Technology Security Evaluation ... evaluation assurance levels (EAL) and the composed assurance packages (CAPs) ...Missing: TCB | Show results with:TCB
-
[34]
[PDF] CC2022PART1R1.pdf - Common Criteriarecommendations on the secure use of the base component that are also addressed as requirements in the base component user guidance. The base component ...
-
[35]
[PDF] Handbook for the Computer Security Certification of Trusted SystemsJan 1, 1996 · Trusted Computing Base, TCSEC. Trusted Computer System Security ... DOD 5200.28-STD, December 1985, (The Orange Book). Department of ...<|control11|><|separator|>
-
[36]
[PDF] Secure Software Systems - University of the PacificEven formal methods can have holes, e.g. Did you prove the right thing? Do your assumptions match reality? Page 34. Testing vs Verification. ⬈ Testing.
-
[37]
[PDF] Arrangement on the Recognition of Common Criteria CertificatesMay 23, 2000 · This arrangement aims to ensure high IT evaluation standards, improve product availability, and allow use of certified products without further ...
-
[38]
[PDF] Building a Trusted Computing FoundationThe Common Criteria for Information Technology Security Evaluation, an international body that establishes computer product security evaluation criteria. As ...
-
[39]
[PDF] Unisys Corporation OS 1100 - DTICSep 27, 1989 · TCB Software. The Trusted Computing Base for OS 1100 is by the nature of the system large, multi-threaded and complex. The software included ...Missing: segmented | Show results with:segmented
-
[40]
[PDF] NSA Security-Enhanced Linux (SELinux)– RoleBased Access Control. – Type Enforcement. – MultiLevel Security ... • Basis for Trusted Computer Solution's Trusted Linux. • Port exists for FreeBSD ...Missing: base | Show results with:base
-
[41]
Chapter 49. Security and SELinux | Red Hat Enterprise Linux | 5In Red Hat Enterprise Linux, MAC is enforced by SELinux. For more information, refer to Section 49.2, “Introduction to SELinux”. 49.1.4. Role-based Access ...
-
[42]
[PDF] Architecture of the Windows Kernel - FSU Computer Science• WRK: Windows Research Kernel (NT kernel in source). • Design Workbook ... ➢ central ACL-based security reference monitor. ➢ configuration (registry).
-
[43]
[PDF] Beware of Geeks Bearing Gifts: A Windows NT Rootkit ExploredApr 4, 2001 · The trust of Kernel mode processes is a fundamental concept of rootkit's ability to undermine the TCB of Windows NT.
-
[44]
Security-Enhanced Linux in Android - Android Open Source ProjectAug 26, 2024 · With SELinux, Android can better protect and confine system services, control access to application data and system logs, reduce the effects of ...Missing: trusted computing base
-
[45]
[PDF] Protecting the Android TCB with SELinuxAug 19, 2014 · Today's Talk. • Looking at how SELinux has been applied over the past year to protect the Android Trusted. Computing Base (TCB).Missing: mobile | Show results with:mobile
-
[46]
FIPS 140-3, Security Requirements for Cryptographic Modules | CSRCThis standard shall be used in designing and implementing cryptographic modules that federal departments and agencies operate or are operated for them under ...
-
[47]
[PDF] Trusted Platform Module 2.0 Library Part 0: IntroductionDec 20, 2024 · Dedicated BIOS support - TPM 2.0 adds a Storage hierarchy controlled by platform firmware, letting the OEM benefit from the cryptographic ...
-
[48]
Trusted Platform Module Technology Overview - Microsoft LearnAug 15, 2025 · The TPM is a secure crypto-processor providing hardware-based security, used for cryptographic operations, device authentication, and system ...
-
[49]
Compliance - AWS CloudHSMRelying on a FIPS-validated HSM can help you meet corporate, contractual, and regulatory compliance requirements for data security in the AWS Cloud. FIPS 140-2 ...Missing: enterprise banking
-
[50]
What is AWS CloudHSM? - AWS CloudHSM - AWS DocumentationA hardware security module (HSM) is a computing device that processes cryptographic operations and provides secure storage for cryptographic keys. With AWS ...Pricing for AWS CloudHSM · Use cases · How it worksMissing: enterprise banking
-
[51]
TrustZone for Cortex-M - ArmTrustZone technology for Arm Cortex-M processors enables robust levels of protection at all cost points for IoT devices.
-
[52]
Security - Arm TrustZone technologyTrustZone works by enabling regions in memory to be marked as Secure or Non-secure, which gives a Secure and a Non-secure memory world within TrustZone.Missing: environments | Show results with:environments
-
[53]
[PDF] Intel Trusted Execution TechnologyThis paper describes a highly scalable architecture called Intel® Trusted. Execution Technology (Intel® TXT) that provides hardware-based security.
-
[54]
[PDF] Intel® Trusted Execution Technology (Intel® TXT)The dynamic PCRs are written by the dynamic root of trust for measurement. (DRTM). In the PC, the DRTM is the process initiated by GETSEC[SENTER]. A PC TPM ...Missing: study | Show results with:study
-
[55]
[PDF] What If You Could Actually Trust Your Kernel? - USENIXThe advent of formally verified OS kernels means that for the first time we have a truly trustworthy foundation for systems. In this paper we explore the ...Missing: issues | Show results with:issues
-
[56]
[PDF] Cybersecurity Supply Chain Risk Management Practices for ...May 5, 2022 · reporting potential indicators of insider threat within the supply chain. Enterprises should require their prime contractors to implement ...<|control11|><|separator|>
-
[57]
[PDF] Insider Threats Involving Supply Chain Risk - DTICAnalysis of the CERT Insider Threat Incident Corpus is dynamic, so categories and definitions are subject to change over time. Page 4. Insider Threat Incidents ...
-
[58]
[PDF] Protecting Commodity Operating System Kernels from Vulnerable ...For example, it identifies interrupt handlers based upon their function prototypes; in Linux interrupt handlers always return a value of type irqreturn t.
-
[59]
[PDF] Guidelines on Minimum Standards for Developer Verification of ...It recommends the following techniques: • Threat modeling to look for design-level security issues. • Automated testing for consistency and to minimize human ...
-
[60]
[PDF] Exploring the Use of Metrics for Software Assurance - DTICThreat modeling. Software risk analysis identifies “input data risks with input verification” as requiring mitigation. Design includes mitigation. Input data ...
-
[61]
Post-Quantum Cryptography | CSRC### Summary of NIST PQC Standardization Timeline and TCB Integration
-
[62]
[PDF] Hardware-Based Trusted Execution for Applications and DataConfidential Computing protects data in use by performing computation in a hardware-based, attested Trusted Execution Environment. These secure and isolated ...
-
[63]
[PDF] A Review of Technologies that can Provide a 'Root of Trust' for ...In December 2020, FireEye discovered that a supply chain attack had compromised SolarWinds. Orion to distribute malware [11]. Victims received a digitally ...