Description
The trend of working remotely requires trusted endpoints for accessing secret data. Previous research
has already shown how to collect system states with hardware modules and use them in attestation pro-
cedures. For the Linux landscape usual application areas are embedded and sensor node networks with
limited hard- and software stacks. This work focuses on determining the usability of the internal integrity
measurement architecture for varying software stacks of Linux desktop systems. The measurements are
used to attest trusted system states by comparing them against reference values that need to be efficiently
obtainable. The goal is to integrate Linux desktop systems into a policy driven, dynamic, and configurable
zero trust environment. Keywords: TPM, policy driven attestation, Linux IMA.
|