Volume 9, Number 3

Emulating Trusted Platform Module 2.0 on Raspberry Pi 2


Jen-Liang Cheng, Kuang-Chi Chen, Hong-Wei Zhang, Wei-Yu Chen and Dai-Ye Wu, Tzu-Chi University, Taiwan


A computer hijacked by a malware may pretend that it is normal as usual and retrieve secrets from storage of itself and other victim computers. By adopting trusted computing technology a computer’s former health status cannot be forged. Computers can thus detect the change of health status of a hijacked computer and prevent the leakage of the secrets. As Trusted Computing Group (TCG) proposed Trusted Platform Module (TPM) specification, IBM implemented software TPM (sTPM) and utilities for engineer who wants to learn the operating principle of TPM. Meanwhile, the blooming of tiny size, but powerful, computers, e.g. Raspberry Pi 2 (Rpi2), attract ones to develop some dedicated applications on the computers. In this article, we report the verified steps for installing new sTPM version on RPi2. After the installation, we also test the functionality and evaluate the performance of the sTPM with some major TPM Commands. The real behaviour of and the traffic between the host computer and the emulated TPM can thus be learned easily.


Trusted Computing, Trusted Platform Module, Software TPM, Raspberry Pi 2.