Definition

Roots of Trust (RoT)

Roots of Trust (RoT) is a set of functions in the trusted computing module that is always trusted by the computer’s operating system (OS). The RoT serves as separate compute engine controlling the trusted computing platform cryptographic processor on the PC or mobile device it is embedded in.

The RoT provides the functionality behind trusted computing features including

  • On the fly drive encryption.
  • Detection and reporting of unauthorized changes to the operating system or programs.
  • Detection of rootkits.
  • Memory curtaining to prevent programs from inappropriately reading from or writing to another program's memory.
  • Hardware-based digital rights management (DRM) support.

Critics argue that this level of control given to the RoT and trusted computing could be used anti-competitively to control what software is used in a computer or deny control of copyrighted data or other user data. Furthermore, although the hardware makes it harder for someone to remotely circumvent the security mechanisms, they could be overcome by physical modification.

This was last updated in January 2014
Contributor(s): Matthew Haughn
Posted by: Margaret Rouse

Related Terms

Definitions

  • air gapping

    - Air gapping is a security measure that involves removing a computer or network from any externally connected network physically and also ensuring there is also no wireless connection. The NSA TEMP... (WhatIs.com)

  • equipment destruction attack

    - An equipment destruction attack, also known as a hardware destruction attack, is an exploit that destroys physical computer and electronic equipment. Equipment destruction attacks can be enabled s... (WhatIs.com)

  • antispoofing

    - Antispoofing is a technique for countering spoofing attacks on a computer network. (SearchSecurity.com)

Glossaries

  • Security threats and countermeasures

    - Terms related to security threats, including definitions about anti-virus programs or firewalls and words and phrases about malware, viruses, Trojans and other security attacks.

  • Internet applications

    - This WhatIs.com glossary contains terms related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce ...

Ask a Question About Roots of Trust (RoT)Powered by ITKnowledgeExchange.com

Get answers from your peers on your most technical challenges

Tech TalkComment

Share
Comments

    Results

    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.