Towards Trustworthy Systems with Open Standards and Trusted Computing

European Multilaterally Secure Computing Base





Use Cases








Here an (unfortunately) incomplete list of related projects. If you think your project should appear on this list feel free to write us an email.

Security Kernels and Security Architectures

Enforcer (Dartmouth College)
The Enforcer is a Linux Security Module designed to improve integrity of a computer running Linux by ensuring no tampering of the file system. It can interact with TCPA hardware to provide higher levels of assurance for software and sensitive data.
EROS (Johns Hopkins University)
EROS merges some very old ideas in operating systems with some newer ideas about performance and resource management. The result is a small, secure, real-time operating system that provides orthogonal persistence.
PERSEUS (eurobits, Ruhr-University Bochum)
The PERSEUS research project aims at establishing an open security architecture by efficiently combining modern operating system and security technology. Based on the well-approved idea of a security kernel, it solves the problem of the ever increasing complexity and insecurity of commonly used operating systems to build a trustworthy computing base that is secure enough to realise new and innovative business models
Xen (University of Cambridge)
Xen is a virtual machine monitor for x86 that supports execution of multiple guest operating systems with unprecedented levels of performance and resource isolation. Xen is Open Source software, released under the terms of the GNU General Public License.

Resource Management

Fiasco (TU Dresden)
Fiasco is a µ-kernel implementation for x86 with an L4 binary interface done by Michael Hohmuth. Fiasco is designed as a preemptible real-time kernel, and is used as a base for the DROPS system.
L4KA (Univerity of Karlsruhe)
The L4Ka research project aims at substantiating and establishing a new methodology for system construction that helps to manage ever-increasing OS complexity and minimizes legacy dependence. Trusted Computing Technology
sHype (IBM T.J. Watson Research Center)
sHype is a hypervisor security architecture developed by IBM Research, in various stages of implementation in several hypervisors. sHype is designed and developed in close collaboration with the IBM Systems and Technology Group.


Trusted Computing Group (AMD, HP, IBM, Intel, Microsoft, ...)
A consortium of platform, software and technology vendors to specify an enhanced trusted computing platform.
Trusted GRUB (eurobits, Ruhr-University Bochum)
TrustedGRUB extends the GRUB bootloader with TCG support making it possible to provide a secure bootstrap architecture. Only a secure bootstrap architecture can prevent that security policies enforced by a secure operating system can be bypassed by booting another (insecure) operating system.

News  &  Events


EMSCB in the Press


© 2005 by EMSCB Consortium Anmelden