A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
The Trusted Execution Module: Commodity General-Purpose Trusted Computing
[chapter]
2008
Lecture Notes in Computer Science
This paper introduces the Trusted Execution Module (TEM); a high-level specification for a commodity chip that can execute usersupplied procedures in a trusted environment. The TEM is capable of securely executing partially-encrypted procedures/closures expressing arbitrary computation. These closures can be generated by any (potentially untrusted) party who knows the TEM's public encryption key. Compared to a conventional smartcard, which is typically used by pre-programming a limited set of
doi:10.1007/978-3-540-85893-5_10
fatcat:ofwpmtpfr5c7fmbht7epzy2q4y