Trusted Execution Technology


Intel Trusted Execution Technology is a computer hardware technology whose primary goals are:
Intel TXT uses a Trusted Platform Module and cryptographic techniques to provide measurements of software and platform components so that system software as well as local and remote management applications may use those measurements to make trust decisions. It complements Intel Management Engine. This technology is based on an industry initiative by the Trusted Computing Group to promote safer computing. It defends against software-based attacks aimed at stealing sensitive information by corrupting system or BIOS code, or modifying the platform's configuration.

Details

The Trusted Platform Module as specified by the TCG provides many security functions including special registers which hold various measurements in a shielded location in a manner that prevents spoofing. Measurements consist of a cryptographic hash using a Secure Hashing Algorithm ; the TPM v1.0 specification uses the SHA-1 hashing algorithm. More recent TPM versions call for SHA-2.
A desired characteristic of a cryptographic hash algorithm is that the hash result of any two modules will produce the same hash value only if the modules are identical.

Measurements

Measurements can be of code, data structures, configuration, information, or anything that can be loaded into memory. TCG requires that code not be executed until after it has been measured. To ensure a particular sequence of measurements, hash measurements in a sequence are not written to different PCRs, but rather a PCR is "extended" with a measurement. This means that the TPM takes the current value of the PCR and the measurement to be extended, hashes them together, and replaces the content of the PCR with that hash result. The effect is that the only way to arrive at a particular measurement in a PCR is to extend exactly the same measurements in exactly the same order. Therefore, if any module being measured has been modified, the resulting PCR measurement will be different and thus it is easy to detect if any code, configuration, data, etc. that has been measured had been altered or corrupted. The PCR extension mechanism is crucial to establishing a Chain of trust in layers of software.

Chain of trust

The technology supports both a static chain of trust and a dynamic chain of trust. The static chain of trust starts when the platform powers on, which resets all PCRs to their default value. For server platforms, the first measurement is made by hardware to measure a digitally signed module provided by the chipset manufacturer. The processor validates the signature and integrity of the signed module before executing it. The ACM then measures the first BIOS code module, which can make additional measurements.
The measurements of the ACM and BIOS code modules are extended to PCR0, which is said to hold the static core root of trust measurement as well as the measurement of the BIOS Trusted Computing Base. The BIOS measures additional components into PCRs as follows:
The dynamic chain of trust starts when the operating system invokes a special security instruction, which resets dynamic PCRs to their default value and starts the measured launch. The first dynamic measurement is made by hardware to measure another digitally signed module which is also provided by the chipset manufacturer and whose signature and integrity are verified by the processor. This is known as the Dynamic Root of Trust Measurement.
The SINIT ACM then measures the first operating system code module. Before the MLE is allowed to execute, the SINIT ACM verifies that the platform meets the requirements of the Launch Control Policy set by the platform owner. LCP consists of three parts:
  1. Verifying that the SINIT version is equal or newer than the value specified
  2. Verifying that the platform configuration is valid by comparing PCR0–7 to known-good values
  3. Verifying that the MLE is valid, by comparing its measurement to a list of known-good measurements.
The integrity of the LCP and its lists of known-good measurements are protected by storing a hash measurement of the policy in the TPM in a protected non-volatile location that can only be modified by the platform owner.

Execute as a Trusted OS

Once the LCP is satisfied, the SINIT ACM allows the MLE to execute as a Trusted OS by enabling access to special security registers and enabling TPM Locality 2 level access. The MLE is now able to make additional measurements to the dynamic PCRs. The dynamic PCRs contain measurement of:
The technology also provides a more secure way for the operating system to initialize the platform. In contrast to the normal processor initialization , the operating system avoids that vulnerability by performing a secure launch which puts the Application Processors in a special sleep state from which they are directly started in protected mode with paging on, and are not allowed to leave this state.

Application

PCR values are available both locally and remotely. Furthermore, the TPM has the capability to digitally sign the PCR values so that any entity can verify that the measurements come from, and are protected by, a TPM, thus enabling Remote Attestation to detect tampering, corruption, and malicious software. Additionally, those values can be used to identify the execution environment and compare them to their own lists of known-good values to further categorize the platform. This ability to evaluate and assign trust levels to platforms is known as Trusted Compute Pools.
Some examples of how Trusted Compute Pools are used:
Numerous server platforms include Intel TXT, and TXT functionality is leveraged by software vendors including HyTrust, PrivateCore, Citrix, and VMware. Open-source projects also utilize the TXT functionality; for example, tboot provides a TXT-based integrity system for the Linux kernel and Xen hypervisor.