Sciweavers

SAC
2006
ACM

The advent of trusted computing: implications for digital forensics

14 years 6 months ago
The advent of trusted computing: implications for digital forensics
The release of computer hardware devices based on “trusted computing” technologies is heralding a paradigm shift that will have profound implications for digital forensics. In this paper, we map out the contours of a trusted environment in order to establish the context for the paper. This is followed by the main components of the TC architecture with an emphasis on the Trusted Platform and the Trusted Platform Module (TPM). The next section presents a synopsis based on three threat models, viz., (i) pc owner-centric, (ii) trusted computing-centric, and (iii) digital forensics-centric and then briefly touches on the implications and unintended consequences of trusted computing for digital forensics. Finally, the last section of the concludes with a recommendation on how to mitigate the negative effects of trusted computing. Categories and Subject Descriptors K.5.0 [Legal Aspects Of Computing]: General. General Terms Security, Legal Aspects. Keywords Cybercrime, data recovery, encr...
Mike Burmester, Judie Mulholland
Added 14 Jun 2010
Updated 14 Jun 2010
Type Conference
Year 2006
Where SAC
Authors Mike Burmester, Judie Mulholland
Comments (0)