Evaluation of the TPM user authentication model for trusted computers

Research output: Contribution to journalArticle

Abstract

A number of previous researchers have discussed the vulnerability of TPM to physical attack and have proposed a number of solutions to solve these issues. Investigation have shown a number of flaws that these solutions suffers from. Trusted Platform Module User Authentication Model (TPM-UAM) is a model that was proposed and evaluated to overcome major safety issue that TPM found to be vulnerable to. A system prototype based on TPM-UAM was developed to prove the TPM-UAM ability to protect trusted computers protected by TPM. Expert review method depends on the understanding that experts are able to provide clear judgment and opinions from their experience and knowledge in their fields. The evaluation process consists of three sections, functionality evaluation, ‘can you break it?’ test and usability evaluation. Three experts in an individual expert review method were asked to evaluate the system prototype in order to confirm the system correctness of design and implementation and also to evaluate the prototype as a reflection of the TPM-UAM and confirm the model ability to protect trusted computers protected by TPM. The evaluation process was conducted as planed and the system prototype was successfully evaluated. The results confirmed on the system’s correct design and implementation, also confirms the correct imitation and representation of the TPM-UAM model in a software prototype, as well as the system efficiency and ability to secure TPM. This paper describes the expert evaluation of software prototype based on TPMUAM model. Three experts in the field of trusted computing and information security evaluated the system prototype individually in three evaluation sections includes functionality evaluation, ‘can you break it’ test and usability evaluation. The evaluation results confirms the system correct design, ability to protect TPM and the reflection of the TPM-UAM model that the prototype system intended to represent.

Original languageEnglish
Pages (from-to)298-309
Number of pages12
JournalJournal of Theoretical and Applied Information Technology
Volume81
Issue number2
Publication statusPublished - 1 Nov 2015

Fingerprint

User Authentication
Authentication
Evaluation
Prototype
Module
Model
Usability Evaluation
Trusted Computing
Imitation
Software
Evaluate
Information Security
Number of Solutions
Security of data
Vulnerability
Hardware security
Correctness
Safety
Attack

Keywords

  • Expert evaluation
  • Functional evaluation
  • Heuristic evaluation
  • Individual expert review
  • TPM

ASJC Scopus subject areas

  • Computer Science(all)
  • Theoretical Computer Science

Cite this

@article{49277f5dada7461a93ab106e18bd783e,
title = "Evaluation of the TPM user authentication model for trusted computers",
abstract = "A number of previous researchers have discussed the vulnerability of TPM to physical attack and have proposed a number of solutions to solve these issues. Investigation have shown a number of flaws that these solutions suffers from. Trusted Platform Module User Authentication Model (TPM-UAM) is a model that was proposed and evaluated to overcome major safety issue that TPM found to be vulnerable to. A system prototype based on TPM-UAM was developed to prove the TPM-UAM ability to protect trusted computers protected by TPM. Expert review method depends on the understanding that experts are able to provide clear judgment and opinions from their experience and knowledge in their fields. The evaluation process consists of three sections, functionality evaluation, ‘can you break it?’ test and usability evaluation. Three experts in an individual expert review method were asked to evaluate the system prototype in order to confirm the system correctness of design and implementation and also to evaluate the prototype as a reflection of the TPM-UAM and confirm the model ability to protect trusted computers protected by TPM. The evaluation process was conducted as planed and the system prototype was successfully evaluated. The results confirmed on the system’s correct design and implementation, also confirms the correct imitation and representation of the TPM-UAM model in a software prototype, as well as the system efficiency and ability to secure TPM. This paper describes the expert evaluation of software prototype based on TPMUAM model. Three experts in the field of trusted computing and information security evaluated the system prototype individually in three evaluation sections includes functionality evaluation, ‘can you break it’ test and usability evaluation. The evaluation results confirms the system correct design, ability to protect TPM and the reflection of the TPM-UAM model that the prototype system intended to represent.",
keywords = "Expert evaluation, Functional evaluation, Heuristic evaluation, Individual expert review, TPM",
author = "Marwan Alshar’E and {Mohd. Zin}, Abdullah and Rossilawati Sulaiman and Mokhtar, {Mohd Rosmadi}",
year = "2015",
month = "11",
day = "1",
language = "English",
volume = "81",
pages = "298--309",
journal = "Journal of Theoretical and Applied Information Technology",
issn = "1992-8645",
publisher = "Asian Research Publishing Network (ARPN)",
number = "2",

}

TY - JOUR

T1 - Evaluation of the TPM user authentication model for trusted computers

AU - Alshar’E, Marwan

AU - Mohd. Zin, Abdullah

AU - Sulaiman, Rossilawati

AU - Mokhtar, Mohd Rosmadi

PY - 2015/11/1

Y1 - 2015/11/1

N2 - A number of previous researchers have discussed the vulnerability of TPM to physical attack and have proposed a number of solutions to solve these issues. Investigation have shown a number of flaws that these solutions suffers from. Trusted Platform Module User Authentication Model (TPM-UAM) is a model that was proposed and evaluated to overcome major safety issue that TPM found to be vulnerable to. A system prototype based on TPM-UAM was developed to prove the TPM-UAM ability to protect trusted computers protected by TPM. Expert review method depends on the understanding that experts are able to provide clear judgment and opinions from their experience and knowledge in their fields. The evaluation process consists of three sections, functionality evaluation, ‘can you break it?’ test and usability evaluation. Three experts in an individual expert review method were asked to evaluate the system prototype in order to confirm the system correctness of design and implementation and also to evaluate the prototype as a reflection of the TPM-UAM and confirm the model ability to protect trusted computers protected by TPM. The evaluation process was conducted as planed and the system prototype was successfully evaluated. The results confirmed on the system’s correct design and implementation, also confirms the correct imitation and representation of the TPM-UAM model in a software prototype, as well as the system efficiency and ability to secure TPM. This paper describes the expert evaluation of software prototype based on TPMUAM model. Three experts in the field of trusted computing and information security evaluated the system prototype individually in three evaluation sections includes functionality evaluation, ‘can you break it’ test and usability evaluation. The evaluation results confirms the system correct design, ability to protect TPM and the reflection of the TPM-UAM model that the prototype system intended to represent.

AB - A number of previous researchers have discussed the vulnerability of TPM to physical attack and have proposed a number of solutions to solve these issues. Investigation have shown a number of flaws that these solutions suffers from. Trusted Platform Module User Authentication Model (TPM-UAM) is a model that was proposed and evaluated to overcome major safety issue that TPM found to be vulnerable to. A system prototype based on TPM-UAM was developed to prove the TPM-UAM ability to protect trusted computers protected by TPM. Expert review method depends on the understanding that experts are able to provide clear judgment and opinions from their experience and knowledge in their fields. The evaluation process consists of three sections, functionality evaluation, ‘can you break it?’ test and usability evaluation. Three experts in an individual expert review method were asked to evaluate the system prototype in order to confirm the system correctness of design and implementation and also to evaluate the prototype as a reflection of the TPM-UAM and confirm the model ability to protect trusted computers protected by TPM. The evaluation process was conducted as planed and the system prototype was successfully evaluated. The results confirmed on the system’s correct design and implementation, also confirms the correct imitation and representation of the TPM-UAM model in a software prototype, as well as the system efficiency and ability to secure TPM. This paper describes the expert evaluation of software prototype based on TPMUAM model. Three experts in the field of trusted computing and information security evaluated the system prototype individually in three evaluation sections includes functionality evaluation, ‘can you break it’ test and usability evaluation. The evaluation results confirms the system correct design, ability to protect TPM and the reflection of the TPM-UAM model that the prototype system intended to represent.

KW - Expert evaluation

KW - Functional evaluation

KW - Heuristic evaluation

KW - Individual expert review

KW - TPM

UR - http://www.scopus.com/inward/record.url?scp=84947550593&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84947550593&partnerID=8YFLogxK

M3 - Article

AN - SCOPUS:84947550593

VL - 81

SP - 298

EP - 309

JO - Journal of Theoretical and Applied Information Technology

JF - Journal of Theoretical and Applied Information Technology

SN - 1992-8645

IS - 2

ER -