What is Roots of Trust (RoT)? - Definition from WhatIs.com

Definition

Roots of Trust (RoT)

Roots of Trust (RoT) is a set of functions in the trusted computing module that is always trusted by the computer’s operating system (OS). The RoT serves as separate compute engine controlling the trusted computing platform cryptographic processor on the PC or mobile device it is embedded in.

The RoT provides the functionality behind trusted computing features including

  • On the fly drive encryption.
  • Detection and reporting of unauthorized changes to the operating system or programs.
  • Detection of rootkits.
  • Memory curtaining to prevent programs from inappropriately reading from or writing to another program's memory.
  • Hardware-based digital rights management (DRM) support.

Critics argue that this level of control given to the RoT and trusted computing could be used anti-competitively to control what software is used in a computer or deny control of copyrighted data or other user data. Furthermore, although the hardware makes it harder for someone to remotely circumvent the security mechanisms, they could be overcome by physical modification.

This was last updated in January 2014
Contributor(s): Matthew Haughn
Posted by: Margaret Rouse

Related Terms

Definitions

  • critical infrastructure security

    - Critical infrastructure security is the area of concern surrounding the protection of systems, networks and assets whose continuous operation is deemed necessary to ensure the security of a given n... (WhatIs.com)

  • virtual machine escape

    - Virtual machine escape is an exploit in which the attacker runs code on a VM that allows an operating system running within it to break out and interact directly with the hypervisor. (WhatIs.com)

  • ransomware

    - Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. Sometimes the malware dupes the vic... (WhatIs.com)

Glossaries

  • Security threats and countermeasures

    - Terms related to security threats, including definitions about anti-virus programs or firewalls and words and phrases about malware, viruses, Trojans and other security attacks.

  • Internet applications

    - This WhatIs.com glossary contains terms related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce ...

Ask a Question About Roots of Trust (RoT)Powered by ITKnowledgeExchange.com

Get answers from your peers on your most technical challenges

Tech TalkComment

Share
Comments

    Results

    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.