 
D10.3 Intermediate Dissemination Activities
Report and Dissemination Plan
(M18) April 2007
Project number
IST-027635
Project acronym
Open_TC
Project title
Open Trusted Computing
Deliverable type
Report
Deliverable reference number
IST-027635/D10.3/V1.0 Final
Deliverable title
Intermediate Dissemination Activities Report 
and Dissemination Plan 
WP contributing to the deliverable
WP10
Due date
April 2007 (M18)
Actual submission date
June 14, 2007
Responsible Organisation
TEC
Authors
TEC
Abstract
This document describes the dissemination 
activities, including exploitable knowledge, of 
the Open_TC consortium up until the present 
point. It also outlines the planned activities 
for the rest of the project.
Keywords
Open_TC, dissemination,  Trusted
Computing, Security, L4/XEN, Trusted
Platform Module (TPM)
Dissemination level
Public
Revision
V1.0 Final
Instrument
IP
Start date of the 
project
1
st
November 2005
Thematic Priority
IST
Duration
42 months
 
D10.3 Intermediate Dissemination Activities Report and Dissemination Plan V1.0
If you need further information, please visit our website
or contact the
coordinator:
Technikon Forschungs-und Planungsgesellschaft mbH
Richard-Wagner-Strasse 7, 9500 Villach, AUSTRIA
Tel.+43 4242 23355 –0
Fax. +43 4242 23355 –77
Email 
The information in this document is provided “as is”, and no guarantee
or warranty is given that the information is fit for any particular purpose.
The user thereof uses the information at its sole risk and liability.
Open_TC D10.3
2/38
 
D10.3 Intermediate Dissemination Activities Report and Dissemination Plan V1.0
Table of Contents
1  Introduction................................................................................................................ 5
2  Intermediate Dissemination Activities........................................................................6
2.1 Overview of conferences, articles and electronic publications............................... 6
2.2 Description of major activities.............................................................................. 16
2.2.1 XEN Summit..................................................................................................... 17
2.2.2 Fostering a European academic research environment for TC ........................17
2.2.3 IPICS Summer Course ..................................................................................... 17
2.2.4 LinuxTag ......................................................................................................... 17
2.2.5 1st Workshop on  Advances in Trusted Computing.......................................... 17
2.2.6 Dagstuhl Seminar – from Security to Dependability.........................................18
2.2.7 2nd Workshop on  Advances in Trusted Computing.........................................18
2.2.8 First Conference on Trusted Computing, Berlin............................................... 18
3 Dissemination plan................................................................................................... 19
3.1 Overview of planned conferences, articles and electronic publications............... 19
3.2 Identified Target groups and identification of relevant venues............................ 23
3.2.1 Government and public authorities..................................................................23
3.2.2 Commercial Entities......................................................................................... 23
3.2.3 Private users.................................................................................................... 24
3.2.4 Open source software developers....................................................................24
3.2.5 Traditional commercial software developers................................................... 24
3.2.6 Hardware developers....................................................................................... 25
4 Exploitable knowledge and its Use........................................................................... 25
4.1 Introduction.......................................................................................................... 25
4.2 Overview of exploitable knowledge...................................................................... 25
4.3 Description of results............................................................................................ 28
4.3.1 CAVEAT and FRAMA-C (formerly PPC).............................................................. 28
4.3.2 Platform Secure Initialization........................................................................... 29
4.3.3 XEN with AMDV support................................................................................... 29
4.3.4 Prototype of reduced libc for Mini- OS..............................................................29
4.3.5 Prototype of library with comms stub.............................................................. 29
4.3.6 IAIK/Open_TC Java TPM Tools (jTPM-Tools).......................................................29
4.3.7 IAIK/Open_TC Java TSS Wrapper...................................................................... 29
4.3.8 IAIK/Open_TC Tccert........................................................................................ 30
4.3.9 IAIK XKMS........................................................................................................ 30
5  Cooperation with external organizations..................................................................30
6  Participation in running / labeled projects................................................................ 33
6.1 Participation in complementary EU/IST projects, Eureka...................................... 33
6.2 Participation in national projects.......................................................................... 36
7 List of Abbreviations ................................................................................................38
Open_TC D10.3
3/38
 
D10.3 Intermediate Dissemination Activities Report and Dissemination Plan V1.0
List of Tables
Table 1: Dissemination activities in the Open_TC project............................................... 6
Table 2: Detailed listing of intermediate dissemination activities.................................16
Table 3: Detailed listing of planned dissemination activities........................................ 23
Table 4: Exploitable knowledge achieved..................................................................... 28
Table 5: Cooperation with external organisations.........................................................32
Table 6: Participation in EU/IST projects....................................................................... 36
Table 7: Participation in national projects..................................................................... 37
Open_TC D10.3
4/38
 
D10.3 Intermediate Dissemination Activities Report and Dissemination Plan V1.0
1 Introduction
The purpose of this report is to collect information on the dissemination activities that 
have been carried out in the Open_TC project up until this point. It also contains a plan 
for upcoming activities based on a form collected from each partner as well as inputs 
gathered during the first 18 month of the project. The purpose of the dissemination 
plan is  coordinating  these activities  as  well  as  providing  guidance  for the partners 
when carrying out the planned activities.
The dissemination activities during the reporting period have mainly been targeted 
towards   the   researchers   and   developers   working   with   different   aspects   of   trusted 
computing. This work will continue throughout the project but there will also be an 
increased effort at targeting the general public and organisations providing software 
and services related to this field.
Further the report contains an overview of the exploitable knowledge and its use in the 
project. The focus on open source makes this an integral part of the dissemination 
activities  as   transparency   and   cooperation   with   the   open   source   community   is   an 
important strategy for gaining acceptance and wide spread adoption of the results.
Open_TC D10.3
5/38
 
D10.3 Intermediate Dissemination Activities Report and Dissemination Plan V1.0
2 Intermediate Dissemination Activities
In the course of the project the Open_TC partners developed a dissemination and use 
plan   which   describes   both,   the   strategies   and   the   activities   of   the   consortium   in 
general,   as   well   as   the   individual   dissemination   approaches   of   the   partner 
organisations.   The   consortium   strives   to   promote   and   encourage   research   about 
Open_TC, targeting European companies and citizens by the diffusion of information 
about the project as well as state-of-the-art and evolution of related technologies.
A rough overview shown below contains a summary of all dissemination activities that 
were carried out and reported during this project period. Afterwards the activities are 
shown in detail in a more comprehensive table and the major activities are described. 
In brief, the amount of different dissemination activities summarised in the following 
table:
Activity type
International
National
Conference
21
2
Workshop
16
3
Article
7
8
Presentation
11
4
Discussion
7
1
Course
15
5
Publication
23
3
Other
14
2
Table 1: Dissemination activities in the Open_TC project
It  can  be  seen  that  the  majority  of the  dissemination activities  has  taken place  in 
international contexts. In addition to their international nature, consortium partners 
have carried out their dissemination work in cooperation. The Open_TC project has 
been   communicated   in  paper  and   electronic   media  in   different   ways   as   well   as   in 
various conferences, summits, workshops and seminars by active participation in the 
organisation of these events or as invited speakers or conference paper contributors. 
2.1 Overview of conferences, articles and electronic publications
The dissemination activities of the Open_TC consortium are collected below and listed 
in chronological order.
Open_TC D10.3
6/38
 
D10.3 Intermediate Dissemination Activities Report and Dissemination Plan V1.0
Date
Type
Type of
audience
Countries
Size of
audienc
e
Partners
10/2005
Press article about the 
content of Open_TC
“Wirtschafts-
nachrichten Süd”
general public
Austria
25.000
readers
TEC
11.11.2005 Informatik Kolloquium
industry
national
TUD
19.- 21.12.
2005
CollaborateCom
industry
international
TUD
Monthly 
starting 
01/2006
Open_TC project details 
(SECOM News List / 
International)
industry
ISECOM
News List/
international
5.000
ISE
17.- 18.01.
2006
XEN Summit
industry
international
~ 200
AMD, HP,
IBM, XEN
20.- 21.02.
2006
Workshop: “Fostering an
European academic 
research environment for 
Trusted Computing” 
organized by the British 
CESG and German BSI
higher
education,
research
Europe
9
RHUL, RUB,
TUD, HP,
CUCL
02/2006
Press article about the 
content of Open_TC
Kleine Zeitung
general public
regional/
Austria
(Carinthia)
TEC
02/2006
Press article about the 
content of Open_TC
Kärntner 
Wirtschaftskammer
industry
Regional/
Austria
(Carinthia)
TEC
02/2006
Press article about the
content of Open_TC 
(Advantage, electronic 
publication)
general
public,
industry
Regional/
Austria
(Carinthia)
TEC
02/2006
Press article about the 
content of Open_TC 
(Economy; regional 
magazine)
industry,
general public
Regional/
Austria
(Carinthia)
TEC
02/2006
Press article about the
content of Open_TC
(New Business)
companies,
industry
Austria
TEC
09.02.2006 Presentation on privacy and
anonymity (Free Software 
and Open Source Days)
industry
international
PORT
09.- 11.02.
2006
Presentation: Linux Users
Association, Inernet 
Association Academic 
computing conference
higher
education
Turkey
About 50-
60
PORT
23.02.2006 Lecture on Trusted
Computing for MSc in
Information Security
higher
education
Europe
40
RHUL
Open_TC D10.3
7/38
 
D10.3 Intermediate Dissemination Activities Report and Dissemination Plan V1.0
Date
Type
Type of
audience
Countries
Size of
audienc
e
Partners
24.02.2006
and
01.03.2006
Analysis and discussion of 
TC, and presentation of 
Open_TC views (Indicare 
Monitor)
industry
international
TUM, HP,
ITAS, LDV
03/2006
Press article about the
content of Open_TC
Kärntner Woche 
(Newspaper and electronic 
publication)
general public
National,
Austria
TEC
03/2006
it&t business (Magazine and
electronic publication)
industry,
general public
National,
Austria
TEC
03/2006
Press article about the 
content of Open_TC 
it&t business
research
National,
Austria
TEC
08.03.2006 Open_TC project
announcement
( Professional Security 
Testers Mailing List / 
International)
professional
security
testers
mailing list
international
60.000
ISE
09.03.2006 1
st
Workshop on Advances
in Trusted Computing
Industry
International
, Japan
100
IBM
13.03.2006 TUDOS Demo CD
industry
international
TUD
19.- 24.03.
2006
Introduction to the Open_TC
project, its goals, technical 
principles, and the 
consortium
industry
international
SUSE
24.03.2006 Article about TC and DRM
related issues.(Turkish
Linux Journal “Penguence”)
industry
Turkey
~150
read,
1000
download
ed
PORT
29.03.2006 “Open source security
testing methodology“
(Security Focus)
industry
international
ISE
29.03.2006 “The man behind OSSTMM”
(The Register)
industry
international
ISE
04/2006
Practical Taint Based
Protection - First European 
Conference on Systems 
(EuroSys2006)
industry
International
CUCL
07.04.2006 ISESTORM
industry
international
ISE
06.- 09.04.
2006
A 20 minute seminar about 
3 promising and upcoming 
new technologies, including 
Trusted Computing and 
Linux
industry
International
~ 400
TUB
Open_TC D10.3
8/38
 
D10.3 Intermediate Dissemination Activities Report and Dissemination Plan V1.0
Date
Type
Type of
audience
Countries
Size of
audienc
e
Partners
08.04.2006 Academic Computing
Conference, Yeditepe
University
Higher
education
Turkey
~ 30
PORT
18.-21.04.
2006
Presentation: EuroSys
research
international
TUD
20.04.2006 2nd International
Conference on Global e-
Security
research
international
ISE
26.04.2006 TRECK (Trust,
Recommendations, 
Evidence and other 
Collaboration Know-how) 
track at the 21
st
ACM
Symposium on Applied 
Computing
higher
education,
research
International
30
RHUL
26.04.2006 Infosecurity Europe
research,
industry
international
50
HP
01.05.2006 
(to be 
published 
12/2006)
Trusted Computing and 
Linux (Hacking Exposed 
Linux 3
rd
Edition)
industry
international
ISE
02.05.2006 IBM Future Business
Summit 2006
industry
international
PORT
03.- 06.05.
2006
LinuxTag 
(2 presentations at different 
events)
industry,
Open Source
developers
international
100
HP, TEC,
CUCL,
SUSE
03.- 04.05.
2006
LinuxTag Conference CD, 
Outline of Open_TC 
industry
international
TEC
05 – 10/
2006
RHUL Trusted Computing
Discussion Group: 4 1-hour 
Tutorials and 12 1-hour 
Discussion Sessions
research
Europe
7
RHUL
03.- 04.05.
2006
LinuxTag Conference CD
industry,
research
international
HP
04.- 05.05.
2006
Austrian Presidency
Conference on European 
Technology Platforms
industry
National,
Austria
TEC
06.05.2006 LinuxTag
industry,
research
international
SUSE, HP
08.05.2006 workshop
government
national
10
HP, RUB
11.- 14.05.
2006
Linux and Free Software 
Festival
industry
international
More
than 100
PORT
16.-19.05.
2006
Fourth iTrust International
Conference  on Trust 
Management
research,
industry
International
RHUL
Open_TC D10.3
9/38
 
D10.3 Intermediate Dissemination Activities Report and Dissemination Plan V1.0
Date
Type
Type of
audience
Countries
Size of
audienc
e
Partners
20.05.2006 Grazer Linux Tag 06
community/
industry
National,
Austria
30
IAIK
22.05.2006 I-NetSec 2006 in
conjunction with IFIP TC 
11's SEC'2006
industry
international
100
BME
22.- 24.05.
2006
ARTEMIS annual conference
2006
industry
international
TEC
30.05.2006 ISECOM Subscriber
discussions
corporate IT
Security
International
1000
ISE
06/2006
Paper submitted to ACM-
CCS-STC (An Open Trusted 
Computing Architecture — 
Secure
virtual machines enabling 
user-defined policy 
enforcement)
international
POLITO,
RUB, HP,
IBM
06/2006
Article about PET
demonstrator for Turkish 
computer magazine
industry
Turkey
~ 30.000
PORT
07.06.2006 News List
network
security
international
10000
ISE
13.06.2006 Presentation at IEE
conference: Crime and
Security
engineers
international
600
HP, IFX
01.07.2006 High-level workshop about
project management of
European research projects 
of the 6
th
framework
program organized by 
Austrian Administrative
industry
international
TEC
10.- 13.07.
2007
International Course on
State of the Art and 
Evolution of Computer 
Security and Industrial 
Cryptography
(www.cosic.esat.kuleuven.b
e/course)
business
Leuven
70
KUL
17.- 28.07.
2006
IPICS Summer Course
(www.cosic.esat.kuleuven.b
e/ipics2006)
students,
business
Leuven
144
KUL, IAIK,
RHUL
20.- 21.07.
2006
CERICS - “Workshop on
Current and Emerging 
Research Issues in 
Computer Security” - 
Research presentation
higher
education,
research
Europe
50
RHUL
Open_TC D10.3
10/38
 
D10.3 Intermediate Dissemination Activities Report and Dissemination Plan V1.0
Date
Type
Type of
audience
Countries
Size of
audienc
e
Partners
31.07.–
04.08.
2006
Usenix Security
industry and
academia
International
CUCL
08/2006
IBM Research Report RZ 
3655 (# 99675)  available 
online
academia,
industry,
public
International
HP, IBM,
POL, RUB
08.08.2006 Presentation at German
ministry of research and
technology
government
officers
National,
Germany
120
IFX
23.08.2006 Information Security
Summer School, Taipei,
Taiwan – Tutorial 
presentation on 
Trusted
Computing
Higher
education,
research
International
60
RHUL
09/2006
EMO Linux Day
industry
Turkey
PORT
09/2006
Cebit Bilişim Eurasia Fair 
and Conference
industry
Turkey
PORT
05.09.2006 SEVECOM Workshop,
Budapest
research,
industry
Europe
TUD
07. – 
08.09.2006
Xen Summit, San Jose, CA
industry
International
150
CUCL
11.-15.09.
2006
Seminar on Dependability
and Security, Dagstuhl
research,
academia
Worldwide
40
IBM, RUB
21.09.2006 Presentation BSI for the
German government
government
officers
Germany
15
IFX
03.10.2006 Presentation, information
Russian government
government
officers
Russia
10
IFX
05.10.2006 Presentation at IFX SW
developers group
SW- and IT
specialists
international
70
IFX
06.10.2006 Conference at Beihang
University, Peking
research
China
TUD
07.10.2006 Conference at Tsinghua
University, Peking
research
China
TUD
09.- 13.10.
2006
IEEE International
Conference on 
Technologies for Homeland 
Security and Safety
industry
international
PORT
1 An Open Trusted Computing Architecture — Secure Virtual Machines Enabling User-Defined
Policy Enforcement.
D. Kuhlmann, R. Landfermann, H. V. Ramasamy, M. Schunter, G. Ramunno, and D. Vernizzi.
Research Report RZ 3655 (# 99675), IBM Research, Aug 2006.
Open_TC D10.3
11/38
 
D10.3 Intermediate Dissemination Activities Report and Dissemination Plan V1.0
Date
Type
Type of
audience
Countries
Size of
audienc
e
Partners
12.10.2006 Paper („
Enabling secure
platforms with Trusted
Computing“
) presented in
TEHOSS 2006 IEEE
conference in Istanbul, 
which is published in 
conference proceedings
University
International
500
TUB
13.10.2006 Presentation to the
„Gesellschaft Informatik“ at
Fuji-Siemens in Munich
industry and
academia
Europe
40
CUCL
14.10.2006 RT Linux Workshop,
Langzhou
research,
industry
international
TUD
16.10.2006 Network Security
Innovation Platform 
Workshop (UK Government 
Department of Trade and 
Industry)
Research,
industry
National
50
RHUL
19.10.2006 11
th
Nordic Workshop on
Secure IT Systems
academic
international
50
BME
19.-20.10.
2006
First Conference on Trusted 
Computing, Berlin
research,
business
Europe
HP, CEA,
RHUL, POL,
IBM, IFX,
ITAS, RUB,
SUSE, TUD,
TEC
21.10.2006 CMS eUniversity Workshop
academic
Greece
15
IAIK
30.10. -
03.11.2006
Conference/Workshop
“ACM CCS / STC 2006”
research
Worldwide
40
RUB
11/2006
Chamber of Electrical 
Engineers (EMO) 
Monthly Technical Seminar
industry
Turkey
PORT
06-08.11.
2006
OSDI, Seattle, USA
researchers
international
TUD
07.11.2006 Open Source Business
Forum in Potsdam
Industry
International
120
CUCL
07.11.2006 ISECOM Subscriber
discussions
corporate IT
Security
International
1000
ISE
08.11.2006 Chamber of Electrical
Engineers (EMO) 
Monthly Technical Seminar
industry
Turkey
20
PORT
08.- 09.11.
2006
IT Security National
Summit, Ireland
Europe
RUB
2 Keynote: “Ten Years of Research on L4-based Real-Time Systems” and Talk: “Towards
runtime monitoring in real-time systems”
Open_TC D10.3
12/38
 
D10.3 Intermediate Dissemination Activities Report and Dissemination Plan V1.0
Date
Type
Type of
audience
Countries
Size of
audienc
e
Partners
08.- 09.11.
2006
Workshop “WISSEC 2006”
research
Worldwide
40
RUB
10.11.2006 Article published in
Datenschutz und 
Datensicherheit, Vieweg
Europe
~ 3000
subscribe
r
IFX
14.11.2006 Linux World Expo, Cologne
Industry
International
CUCL
14.-17.11.
2006
Software Defined Radio
Technical Conference 2006 
– Invited conference paper
research,
industry
International
200
RHUL
16.11.2006 Booth and presentation
Security and smartcard fair
industry
specialists
international
3000
IFX
21- 23.11. 
2007
EuroSys 2007
researchers
international
TUD
29.11.2006 2
nd
Workshop on Advances
in Trusted Computing
industry,
academia
International
, Japan
30
IBM
29.11.2006 Workshop paper
academia,
industry
International
, Japan
30
IBM
30.11.-
01.12.2006
Workshop “WATC”
research
Worldwide
40
RUB
30.11. – 
03.12.2006
Corporate Technologies Fair
industry
Turkey
More
than 500
PORT
1.12. 2006 Workshop on vulnerabilities
and defense techniques 
(NAC, IDS and TC)
Business
and
technical
managers
I
taly
~50
POL
05.12.2006 Presentation at German
ministry of research and
technology
research
specialists,
universities
Germany
100
IFX
07.12.2006 AFCEA Information Day
military/gover
nmental
international
More
than 150
PORT
18.12.2006 HP Day at Royal Holloway
University
Industry and
Academia
National
100
HP
21.-23.12.
2006
INET-TR Internet 
Conference
industry
Turkey
More
than 100
PORT
2006
Paper contribution for
WATC'06
academia,
research
international
RUB
3 Flexible Integrity Protection and Verification Architecture for Virtual Machine Monitors.
B. Jansen, H. V. Ramasamy, and M. Schunter.
Second Workshop on Advances in Trusted Computing (WATC-2006), November 30 - 
December 1, 2006, Tokyo, Japan. To appear.
4 Ahmad-Reza Sadeghi, Michael Scheibel, Stefan Schulz, Christian Stüble, Marko Wolf: Play it
once again, Sam - Enforcing Stateful Licenses on Open Platforms, accepted to be presented 
at The Second Workshop on Advances in Trusted Computing (WATC '06 Fall).
Hans Löhr, Hari Govind V. Ramasamy, Stefan Schulz, Matthias Schunter, Christian Stüble: 
Enhancing Grid Security Using Trusted Virtualization, accepted to be presented at The 
Open_TC D10.3
13/38
 
D10.3 Intermediate Dissemination Activities Report and Dissemination Plan V1.0
Date
Type
Type of
audience
Countries
Size of
audienc
e
Partners
2006
Workshop for
Computing
academia
research
International
RUB
2006
Security Architectures for
Software
academia
research
International
RUB
2006
academia
research
International
RUB
2006
n Usability and
Transparency
academia
research
International
RUB
2006 - 
2007
RHUL Trusted Computing 
Discussion Group: 4 1-hour 
Tutorials and Weekly 1-hour 
Discussion Sessions
Research
Europe
7
RHUL
01/2007
HPLabs research show and
tell
Analysts
Europe
15
HP
01/2007
Article about TC: Official 
magazine of Chamber of 
Electrical Engineers (EMO) 
“Elektrik Mühendisliği”
industry
Turkey
~ 30.000
PORT
11.01.
2007
IEEE CCNC ‘07 Conference
(DRM Workshop) paper
scientific
community,
R&D
personnel
International
29.-30.01.
2007
ICT Conference İstanbul
industry
Turkey
More
than 100
PORT
31.01. –
02.02.2007
Academic Computing
conference, Kütahya (3 
seperate presentations)
higher
education
Turkey
More
than 100
PORT
Second Workshop on Advances in Trusted Computing (WATC '06 Fall).
5 Liqun Chen, Rainer Landfermann, Hans Löhr, Markus Rohe, Ahmad-Reza Sadeghi and
Christian Stüble:
A Protocol for Property-Based Attestation,
accepted for The First ACM
Workshop on Scalable Trusted Computing (STC'06).
Ahmad-Reza Sadeghi, Marcel Selhorst, Christian Stüble, Christian Wachsmann and Marcel
Winandy:
TCG Inside? - A Note on TPM Specification Compliance,
accepted for The
First ACM Workshop on Scalable Trusted Computing (STC'06).
6
Ulrich Huber, Ahmad-Reza Sadeghi, Marko Wolf:
Security Architectures for Software
Updates and Content Protection in Vehicles,
accepted for Automotive Safety and
Security 2006, Stuttgart, Germany.
Ammar Alkassar, Michael Scheibel, Ahmad-Reza Sadeghi, Christian Stüble, Marcel 
Winandy:
Security Architecture for Device Encryption and VPN,
accepted for ISSE
(Information Security Solution Europe) 2006.
7 Ahmad-Reza Sadeghi, Michael Scheibel, Christian Stüble, Marcel Winandy:
Design and
Implementation of a Secure Linux Device Encryption Architecture,
accepted to be
presented at Linux-Tag 2006.
8 Sebastian Gajek and Ahmad-Reza Sadeghi:
Client Authentication in Federations Using
a Security Mode,
accepted to be presented at Toward a More Secure Web - W3C
Workshop on Usability and Transparency of Web Authentication. Available at
http://www.w3.org/2005/Security/usability-ws/program
.
9 Efficient design of interpretation of REL license using Expert Systems
Open_TC D10.3
14/38
 
D10.3 Intermediate Dissemination Activities Report and Dissemination Plan V1.0
Date
Type
Type of
audience
Countries
Size of
audienc
e
Partners
02/2007
Submitted paper to Usenix 
2007. Waiting for reply as 
to whether it has been 
accepted or not. Usenix is 
in Santa Clara, CA, June 17–
22
Industry,
Government,
Academia
International
HP
02/2007
Submitted paper to
European The eChallenges 
e-2007 Conference & 
Exhibition
Industry,
Government,
Academia
European
HP
07.02.2007 Workshop on security for
business applications
Business and
technical
managers
Italy
~100
POL
12.- 15.2. 
2007
TC Panel Discussion at 
“Financial Cryptography 
2007”
Research/
Industry
Worldwide
60
RUB
12.02.2007 I4 conference in Monteray
Industry
International
100
HP
15.02.2007 Lecture on Trusted
Computing for MSc in
Information Security – 
Software Security Course
Higher
education
Europe
40
RHUL
23.- 24.2.
2007
Chamber of Electrical
Engineers Linux Days, 
Eskişehir (2 separate 
presentations)
higher
education /
industry
Turkey
More
than 300
PORT
26.- 27.2. 
2007
Workshop on Trusted 
Computing from a 
European Perspective – The 
Impact on the Public Sector 
– Bonn, Germany
Representativ
es from the
business and
scientific
communities
and public
administratio
n dealing with
matters
related to
trusted
computing
Europe
80
HP,POL
26.-2 7.2.
2007
EU Workshop
“Deployment of TC for 
Government Organizations”
Research/
Government
Europe
100
RUB
01.03.2007 Chamber of Electrical
Engineers Seminar, Ankara
industry
Turkey
~ 30
PORT
01.03.2007 Article about TC: Official
magazine of Chamber of
Electrical Engineers (EMO) 
“Elektrik Mühendisliği”
industry
Turkey
~ 30.000
PORT
Open_TC D10.3
15/38
 
D10.3 Intermediate Dissemination Activities Report and Dissemination Plan V1.0
Date
Type
Type of
audience
Countries
Size of
audienc
e
Partners
03.-04.03. 
2007
Free Software and Open 
Source Days, İstanbul
industry
International
More
than 50
PORT
05.–06.03.
2007
FP7 Security Theme
Information Day, Ankara
military /
research
International
~ 30
PORT
15.-21.03. 
2007
Presentation of Significant 
European Projects on TC at 
CeBIT (Open_TC, EMSCB)
IT-Industry
Worldwide
RUB
20.03.2007 RE-Trust workshop . RE-
TRUST project; this is an
EU-funded research project 
lead by the University of
Trento on Remote 
EnTrusting by RUn-time 
Software auThentication.
For more details on this 
project see: http://re-
trust.dit.unitn.it/
Academia and
Industry
Europe
HP
21.03.2007 Seminar to be given at the
Department of Computer 
Science and Software 
Engineering, University of 
Canterbury, New Zealand, 
entitled: 'Trusted 
Computing: A universal 
security infrastructure?'
Higher
education,
Research
National
25
RHUL
28.03.2007 Talk to the New Zealand
Information Security Forum,
Auckland, New Zealand, 
entitled: “Trusted 
Computing: Putting a 
Security 
Module on Every Desktop”
Industry
National
RHUL
28.03.2007 Seminar to be given at the
Centre of Digital Enterprise
(CODE), University of 
Auckland, New Zealand, 
entitled: “Trusted 
Computing: A Universal 
Security Infrastructure?”
Research
National
RHUL
2007
we plan to issue an 
Open_TC newsletter
industry,
government
international
All, as
authors
Table 2: Detailed listing of intermediate dissemination activities
2.2 Description of major activities
Open_TC D10.3
16/38
 
D10.3 Intermediate Dissemination Activities Report and Dissemination Plan V1.0
2.2.1 XEN Summit
AMD attended the XEN summit to get the relevant people for XEN security and hence 
for DRTM directions together to talk about directions a DRTM approach should take. 
Main   partners   are   XEN,   HP,   IBM.   An   additional   goal   was   it   to   discuss   further 
development of AMDV/XEN abstraction. 
2.2.2 Fostering a European academic research environment for TC
This workshop was attended by partners RHUL, RUB, TUD, HP and CUCL. HP took part 
in the organisation of the workshop, while presentations were given by RHUL (Using 
mobile   devices   in   a   secure   environment),   RUB   (A   Security   Architecture   for 
Enforcement and Transfer of Licenses) and CUCL (The Xen Project). The outcomes of 
the   workshop   included   knowledge   of   the   public   sector   requirements   regarding   TC, 
dissemination of Open_TC work and participation in a European working group on TC.
2.2.3 IPICS Summer Course
COSIC, a research group from the Katholieke Universiteit Leuven conducting research 
on computer security and industrial cryptography, organised a summer course with 
the   focus   on   privacy   towards   the   end.   The   first   week   of   the   summer   course   was 
dedicated to general information on communication security while the second week 
focused on secure implementation and secure applications. 
(www.cosic.esat.kuleuven.be/ipics2006)
2.2.4 LinuxTag
The LinuxTag 2006 is one of the leading European events for Free Software, Linux and 
Open Source. During this event, current thematic areas, products and projects have 
been discussed; major players in this field, as for instance HP and SUN contributed, 
presenting  inter  alia  Groupware-Solutions   and   Content  Management   Systems.  More 
than a half of the 250 sessions have been presented by international speakers from 
South Africa, Argentina, Japan, United Kingdom, France, and the United States, among 
them   Open_TC   Consortium   members   with   their   presentations.   With  more   than   90 
exhibiting   free   projects   LinuxTag   is   the   most   important   platform   for   Open-Source-
Projects worldwide.
2.2.5 1
st
Workshop on Advances in Trusted Computing
IBM organised a workshop in Japan in March 2006. Both projects aim at Open Source
Open_TC D10.3
17/38
 
D10.3 Intermediate Dissemination Activities Report and Dissemination Plan V1.0
trusted computing solutions. As a consequence, we agreed that we will try to set up a 
closer collaboration. We plan to exchange technical specifications and we have issued 
an invitation to the Japanese researchers to join the September´s general assembly.
2.2.6 Dagstuhl Seminar – from Security to Dependability
The   Dagstuhl   Seminar   addressed   questions   concerning   safety,   fault-tolerance   and 
security   in   computing.   Despite   the   research   efforts   of   the   last   decades,   the   vast 
progress,   for   example   in   the   field   of   cryptography,   and   the   impressive   security 
technology,   made   that   it   is   deployed   with   modern   operating   systems   but   security 
problems have not gone away. The possibility of the lack of integration was examined 
especially in terms of fault tolerance .
http://www.dagstuhl.de/de/programm/kalender/semhp/?semid=28534
2.2.7 2
nd
Workshop on Advances in Trusted Computing
The Second Workshop on Advances in Trusted Computing (WATC) was held in Tokyo, 
Japan from 
November 30
th
through December 1
st
2006
. The Workshop was devoted to
the dissemination and further development of the boundary areas between trusted 
computing   and   information   security.   This   is   the   second   instalment   of   an   informal 
workshop series that started in March 2006. The workshop aims at bringing together 
researchers and practitioners from various areas working on trusted computing and to 
be   instrumental   in   shaping   the   identity   of   the   Trusted   Computing   community.   The 
workshop   was   open   to   all   interested   people.   The   Xen   security   services   framework 
designed   by   IBM   was   presented.   IBM   also   actively   pursued   opportunities   for 
collaboration   with   the   research   group   on   Trusted   Computing   at   the   IBM   Tokyo 
Research Lab. A first concrete step in this direction has been taken in the form of a 
planned integration of the Xen security services developed by the IBM Zurich group 
and the validation service developed by the IBM Tokyo research group. We continue to 
investigate options of collaborations with other entities within and at the outside of 
IBM.
2.2.8 First Conference on Trusted Computing, Berlin
From 19.-20. October 2006, the first conference "The World of Trusted Computing" was 
held   at   the  German  Ministry   of  Economics   and   Technology   (BMWi),   Berlin.   Trusted 
Computing experts addressed the current aspects, benefits, and challenges of Trusted 
Computing with regard to their economic and technical aspects as well as its potential 
risks. The attendees had the opportunity to discuss and exchange information with 
experts   on   already   existing   experiences   in   this   domain   during   the   conference. 
Information on how and to what extent Trusted Computing is applied in practice and 
also  what   can   be   expected   in   the   future,   was   shown.   The   public   view   of   trusted 
computing was  discussed and it was agreed that public relation is an important part 
for any one who is involved in trusted computing as there are possible contentious 
uses for the technology. Further workshops will be organised on the theme as a part of 
workpackage 10.
Open_TC D10.3
18/38
 
D10.3 Intermediate Dissemination Activities Report and Dissemination Plan V1.0
3 Dissemination plan
The dissemination activities will continue throughout the remainder of the project, 
further emphasis will be put on reaching the general public and those not directly 
involved with trusted computing. A considerably larger installed base of the necessary 
hardware components is expected in the near future making it possible for a larger 
base of developers and other computer savvy persons to try out and experiment with 
trusted computing. It is therefore important to provide targeted information, and, if 
necessary, feedback, to promote the results of Open_TC as the solution of choice for 
trusted computing.
3.1 Overview of planned conferences, articles and electronic publications
The planned dissemination activities of the Open_TC consortium are collected below 
and listed in a chronological order. Additional activities have to be expected when the 
partners have prepared more detailed plans for their work. Invitations to contribute to 
both   publications   and   conferences   are   expected   as   the   project  receives   more   and 
more attention throughout Europe and the rest of the world.
Dates
Type
Type of
audience
Countries
Size of
audience
Partners
04/2007
TUBITAK Marmara
Research Center 
Technology Seminar
research
Turkey
More than
100
PORT
04/2007
IBM Partners Meeting,
İstanbul
industry
Turkey
PORT
04/2007
Gebze Technopark 
Technology Seminar
industry
Turkey
PORT
10.04.2007 METU, Invited Lecture
for Technology 
Management Course
higher education
/ industry
Turkey
About 20
PORT
05/2007
Grazer Linux Tag 07
community/
industry
Austria
IAIK
05/2007
Bilkent University, 
Ankara
higher education
Turkey
PORT
05/2007
METU, Ankara
higher education
Turkey
PORT
03.- 06.05.
2007
Linux and Free
Software Festival
industry
Internatio
nal
PORT
08- 10.5. 
2007
TUBITAK has submitted 
a workshop proposal 
with topic „future of 
trusted computing“ 
international 
Conference on Security 
of Information and 
Networks (SIN 2007)
University
Internatio
nal
>1000
TUB
Open_TC D10.3
19/38
 
D10.3 Intermediate Dissemination Activities Report and Dissemination Plan V1.0
Dates
Type
Type of
audience
Countries
Size of
audience
Partners
21- 23.05.
2007
UbiSafe Computing
2007 - The 2007 IEEE 
International Symposium 
on Ubisafe Computing, 
Ontario, Canada, “Mobile 
Agents and the Deus 
Ex Machina”
Higher education,
research
Internatio
nal
RHUL
06/2007
METU Technopolis
industry
Turkey
PORT
07/2007
Article about PET
demonstrator for EMO 
Ankara Branch 
Newsletter Special 32 
page Issue on Open 
Source Software
industry
Turkey
About
8000
PORT
10.-13.07. 
2007
International Course on 
State of the Art and 
Evolution of Computer 
Security and Industrial 
Cryptography
(www.cosic.esat.kuleuv
en.be/course)
business
Leuven
70
KUL
30.07.- 
02.08.2007
IFIPTM 2007 - Joint 
iTrust and PST 
Conferences on 
Privacy, Trust 
Management and 
Security, Moncton, 
New Brunswick, 
Canada
Higher education,
Research,
Industry
Internatio
nal
RHUL
09-15.09.
2007
Session to be given at
FOSAD 07 (Seventh 
International School on 
Foundations of 
Security Analysis and 
Design), Bertinoro, 
Italy, entitled “Trusted 
Mobile Platforms”
Research
Internatio
nal
RHUL
09-15.09. 
2007
Paper on “Trusted 
Mobile Platforms” to 
appear in the 
proceedings of  FOSAD 
07 (Seventh 
International School on 
Foundations of 
Security Analysis and 
Design), to be 
published in the 
Springer LNCS series
Research
Internatio
nal
RHUL
Open_TC D10.3
20/38
 
D10.3 Intermediate Dissemination Activities Report and Dissemination Plan V1.0
Dates
Type
Type of
audience
Countries
Size of
audience
Partners
07-09.11.
2007
TUBITAK will be
submitting a paper to 
ISCIS (22
nd
International 
Symposium on 
Computer and 
Information Sciences) 
related to trusted 
computing.
Mainly
universities and
academicians
Internatio
nal
About 800
TUB
21-23.11.
2007
EuroSys 2007
researchers
internatio
nal
TUD
2007
Conference paper 
submission
researchers
Internatio
nal
CEA
2007
Paper on the C code
static analysis tool
industry
Internatio
nal
CEA
2007
Publication
researchers,
industry
Internatio
nal
CEA
2007
Publication on CEA
intranet
employees of
CEA
CEA
CEA
2007
Publication
industry
national
CEA
2007
Paper contribution
academia,
research
internatio
nal
RUB
2007
Paper contribution
academia,
research
internatio
nal
RUB
2007
Presentation
internal:
laboratories,
department and
company
meetings
CEA
CEA
Q1 2007
Protecting OS with 
Immutable Memory
industry
Internatio
nal
CUCL
10 CEA-LIST intends to publish the results of its activities within Open_TC in the form of paper
submissions to conferences dealing with software engineering and static analysis.
Candidates are the 2007 CAV, SAS and TACAS conferences.
11 Sebastian Gajek, Ahmad-Reza Sadeghi, Christian Stüble and Marcel Winandy:
Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted 
Computing,
accepted for The Second International Conference on Availability, Reliability
and Security ARES 2007.
12
Liqun Chen, Alberto Escalante, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi:
A Privacy-
Protecting Multi-Coupon Scheme with Stronger Protection against Splitting,
accepted for the 11th International Conference on Financial Cryptography and Data Security 
(FC 2007), 12-15 February, Trinidad/Tobago.
Open_TC D10.3
21/38
 
D10.3 Intermediate Dissemination Activities Report and Dissemination Plan V1.0
Dates
Type
Type of
audience
Countries
Size of
audience
Partners
Q3 2007
writing a book chapter
„Trusted computing 
with Linux“ in „Hacking 
Exposed Linux“ 3
rd
edition which is
directed by ISECOM. 
The book will be 
published by Wiley & 
Associates
General public
internatio
nal
TUB
March 11
th
-12
th
2008
Trust2008:
International 
Conference  on Trusted 
Computing to be held 
in Villach, Austria
academic
teachers, 
students, 
engineers
Europe /
WW
300 – 400
participan
ts
TEC
March 10
th
-14
th
2008
Trust2008;
International Spring 
School on Trusted 
Computing
students
Europe /
WW
40-60
participan
ts
TEC
2005-2010 Intensive cooperation
and training activities
with universities and 
similar;
Development support
academic
teachers ,
students
Europe /
WW
About 25
contacs to
different
universiti
es and
research
institutes
IFX
2007-2009 ca. 20 Public
presentations
conference
visitors, experts
and layman
Europe/
WW
10-500
IFX
2007-2009 ca. 10 high level
presentation
decision makers,
laymen, politics
Europe/
WW
ca. 10-50
listeners
IFX
2007-2009 Individual customer
training events
technical experts
Europe/
WW
Ca 400
potential
customer
s
IFX
2007-2009 About 15 journals
technical publications
technical experts
Europe/
WW
ca. 40000
subscribe
rs
IFX
2007-2009 About 10 high level
journal publications
decision makers,
laymen,
journalists
Europe/
WW
ca. 5000
subscribe
rs
IFX
Continuous
ly
maintaining the web 
site „trustedforum.org“ 
from the project start, 
and populates the web 
with relevant news, 
organizations, 
seminars and blogs.
General public
Internatio
nal
TUB
Open_TC D10.3
22/38
 
D10.3 Intermediate Dissemination Activities Report and Dissemination Plan V1.0
Dates
Type
Type of
audience
Countries
Size of
audience
Partners
Continuous
ly
Active participation in
TCG standardisation 
and management 
meetings
TCG
internatio
nal
POL
Table 3: Detailed listing of planned dissemination activities
3.2 Identified Target groups and identification of relevant venues
Three key groups of end users have been identified by the consortium:
•
Government and public authorities
•
Commercial entities
•
Private users
In addition to these groups there is also big  interest coming from software developers 
and other organisation that will use the results of Open_TC in their own products.
•
Open source software developers
•
Traditional commercial software developers
•
Hardware developers and equipment manufacturers
The   majority   of   the   dissemination   activities   target   several   of   these   groups 
simultaneously,   but   there   are   differences   between   the   groups   that   need   to   be 
recognised and addressed when preparing for a dissemination activity. Standardisation 
organisations are addressed separately as a part of sub workpackage 10a and is not a 
part of this report.
3.2.1 Government and public authorities
E-Government is an important topic for any public authority, and large advances have 
been made in most European countries. The content is still mostly informational as 
there are few widely deployed solutions for identification and exchange of sensitive 
information. The open and transparent nature of Open_TC and its results offers public 
authorities a platform  to build there future solutions on. Many of these governments 
and authorities   have   very decentralised structures with widespread offices all over 
the   country.   The   administration   and   the   share   of   sensitivity,     information   and   the 
infrastructure it requires, can be   advanced by the results of the Open_TC project. 
These   organisations   have   large   IT   departments   that   attend   conferences   and   fairs 
where they can be approached. It  is also important to address the decision makers 
directly such as those holding public office. An important asset is the network towards 
public authorities, built up by the larger partners of the project. TEC researches the 
opportunities   of   Trusted   Computing   for   the   Austrian   Government   on   behalf   of   the 
Austrian Ministry for Traffic, Innovation and Technology (BMVIT). 
3.2.2 Commercial Entities
The   costs   for   administering   and   securing   the     IT   security   of   an   organisation     are 
steadily growing, as the reliance of on IT systems increases. The Open_TC project can 
offer a unified, virtualised platform on which to run both clients and servers. Secure 
virtualisation   offers   reduced   heterogeneity   through   standardised   virtual   hardware 
interfaces   while   offering   unsurpassed   client   level   protection   from   intentional   and 
accidental security incidents. It also offers the possibility to use shared resources such 
Open_TC D10.3
23/38
 
D10.3 Intermediate Dissemination Activities Report and Dissemination Plan V1.0
as an employees private computer or the server farm of a third party for processing 
confidential data. Conferences, journals and fairs play very important roles   but also 
contacts are built up through marketing and sales departments .
3.2.3 Private users
For many private users trusted computing is connected to DRM and Big Brother type of 
software. It is therefore important to emphasise the transparency of the project results 
and efforts and to present the benefits, also for the private end user. The Open_TC 
implementation of trusted computing is following an opt in model so TC is never forced 
upon the user. Separate virtual instances of an OS for different family members can be 
used to increase the security and privacy of the individual user. Concerning that the 
information on public websites such as 
and
play an important role . Project members also need to be involved in the public debate 
through blogs and mailing lists where much negative and biased information is spread. 
Traditional print media such as  cT, published in Germany, also play an important role 
in forming the public opinion, a good relation with traditional media is therefore   of 
very great interest.
3.2.4 Open source software developers
Open source software developers are a very important target group for Open_TC. A 
large part of the software stack needed in Open_TC has been released under various 
open source software licenses. Interaction with the OSS community is   important to 
ensure   support   for   the   project   and   its   results   and   to   achieve   a   widespread 
implementation   of   the   Open_TC   platform.   The   OSS   community   also   provides   peer 
review of the Open_TC results, which is an important function to achieve the level of 
transparency needed for acceptance among the public and the OSS community. The 
venues are mostly the same as those for private users, public websites and mailing 
lists but also technical papers and journals. 
3.2.5 Traditional commercial software developers
Several   new   business   models   have   been   established   on   the   back   of   open   source 
software and it is the firm belief of the Open_TC consortium that the   results will be 
used in a variety of software types besides those foreseen by the project members. 
Key factors that have been identified as very important to ensure a fast uptake of the 
Open_TC results are:
•
Stable and well documented API
•
Clear and if possible unified licensing structure
•
Security updates back ported to previous versions
Conferences, papers, journals and fairs play a big role in reaching the users. Sales and 
marketing   issues   are   other   important   interfaces.   Collaborations   creates   other 
opportunities to directly interact with developers and other technical personnel.
Open_TC D10.3
24/38
 
D10.3 Intermediate Dissemination Activities Report and Dissemination Plan V1.0
3.2.6 Hardware developers
The Open_TC results are expected to be used, not only on traditional PC hardware, but 
also   in   a   variety   of   embedded   systems.   Such   systems   are   often   connected   to   a 
sizeable investment in design, as well as with long life spans. A stable API with back 
ported security updates is therefore important again. A scalable foot print tailored to a 
specific purpose can also be of importance on this market. See Traditional commercial 
software developers above for dissemination venues.
4 Exploitable knowledge and its Use
4.1 Introduction
In   the   course   of   the   project   the   Open_TC   partners   are   developing   a  use   and 
exploitation plan for the results reached within the Open_TC project. This plan is tightly 
connected to the dissemination activities in the project through the open nature of the 
results. Parts of the internal deliverable “Intermediate exploitation plan” is therefore 
presented here. It describes the currently available results of the Open_TC project as 
well as the exploitation taken place or planned in the near future by the partners.
4.2 Overview of exploitable knowledge
During the first year of Open_TC project the project partners achieved a great deal of 
exploitable knowledge. The details of the products including their patents or other IPR 
issues are listed below.
Exploitable
Knowledge
(description)
Exploitable
product(s) or 
measure(s)
Sector(s) of
application
Timetable
for comm-
ercial use
Patents or
other IPR
Owner /
partner(s) 
involved
Static C code
analyser
CAVEAT
safety critical
sectors 
including 
aeronautics, 
space, railways, 
nuclear power 
plants, medical 
devices.
Undefined
currently 
(point wise 
agreements)
Deposit of a
CAVEAT 
version at 
an usher
CEA
Static C code 
analyser
FRAMA-C 
(formerly PPC)
identical
no plans so 
far
none
CEA
Open_TC D10.3
25/38
 
D10.3 Intermediate Dissemination Activities Report and Dissemination Plan V1.0
Exploitable
Knowledge
(description)
Exploitable 
product(s) or 
measure(s)
Sector(s) of 
application
Timetable 
for comm-
ercial use
Patents or 
other IPR
Owner / 
partner(s) 
involved
Prototype 
Implementation 
for Platform 
Secure 
Initialization 
using a DRTM
Platform Secure 
Initialization
Servers, 
Desktops
2008 and 
ongoing
No 
particular 
plans for 
patents so 
far, IP rights 
are at AMD
No direct 
partner 
involvemen
t in 
Open_TC. 
Sync with 
XEN and L4 
people 
about 
directions 
happened. 
Consultatio
ns with 
external 
partners 
underway.
Abstraction
layer between 
AMDV and XEN
XEN with AMDV
support
Server
Virtualization
Ongoing
No
particular 
plans for 
patents so 
far, IP rights 
are at AMD
Cooperation
between 
AMD and 
XEN
Partial libc 
support for Xen 
Mini-OS
Prototype of 
reduced libc for 
Mini- OS
Universal (OS 
virt.)
2008
None, 
intended  
release as 
OSS 
HP, 
CUCL
Stub for IPC
based,    socket-
like 
communication 
between Xen 
domains
Prototype of
library  with 
comms stub
Universal
(OS virt.)
2008
None,
intended  
release as 
OSS
HP
Expertise in 
trusted 
computing 
technology
Delivery of 
masters level 
course in TC
higher 
education
January 2007 
(start)
-
RHUL
MPEG
Standardization
Open Release
MAF
components of
MPEG-21: REL, 
Event Reporting
2009
-
DMP,
Universitat 
Pompeu 
Fabra,
DRM Inside
(reported 
by LDV)
Trusted
Computing 
computing base
TEC transferred
its Knowledge 
Suite onto 
Trusted 
Computing 
plattforms
Secure Web
Services
2008 and
beyond
No
TEC
Open_TC D10.3
26/38
 
D10.3 Intermediate Dissemination Activities Report and Dissemination Plan V1.0
Exploitable
Knowledge
(description)
Exploitable 
product(s) or 
measure(s)
Sector(s) of 
application
Timetable 
for comm-
ercial use
Patents or 
other IPR
Owner / 
partner(s) 
involved
Framework for 
security 
management
Technology 
developed 
under Open_TC is 
expected to 
influence IBM's 
system 
management 
products
data center 
management
corporate 
computing at 
home
Post-2009
Yes
IBM (owner)
Security metrics Auditing Services,
Procurement 
Services, Product 
Labeling
IT, banking
consultancy, 
finance/auditing
2007
None. Open
Source 
License
ISECOM
Trust Metrics
Computerized 
Trust decision 
making
sales,
auctions,
financing,
loans
2007
None. Open 
Source 
License
ISECOM
set of command
line utilities to 
interact with the 
system's TPM
IAIK/Open_TC
Java TPM Tools 
(jTPM-Tools)
software
development
2006
None, open
source
IAIK
object oriented
Java API for 
interaction with 
the TCG 
Software Stack 
(TSS) for Java 
applications 
IAIK/Open_TC
Java TSS Wrapper
software
development
2006
None, open
source
IAIK
Use of TPM as
an additional 
authentication 
factor
Strong
authentication to 
Linux server
financial/
government
2008
A materials
patent is 
planned for 
2008
(reported
by INTEK)
tool to create 
special types of 
certificates and 
certificate 
extensions as 
specified by the 
Trusted 
Computing 
Group
IAIK/Open_TC 
TCcert
software 
development
2006
None,
free for 
research, 
education 
and 
evaluation
IAIK
XKMS PKI 
protocol 
implementation
IAIK XKMS
software 
development
end of 2006
None,
free for 
research, 
education 
and 
evaluation
IAIK
Open_TC D10.3
27/38
 
D10.3 Intermediate Dissemination Activities Report and Dissemination Plan V1.0
Exploitable
Knowledge
(description)
Exploitable 
product(s) or 
measure(s)
Sector(s) of 
application
Timetable 
for comm-
ercial use
Patents or 
other IPR
Owner / 
partner(s) 
involved
High Security 
chip technology 
like smartcards
Dedicated 
security 
solutions;
Developing 
trusted 
computing 
solutions for 
specific use areas
industrial 
platform 
integrity, 
trusted players
ongoing
Standard 
security 
patent 
portfolio
IFX and 
others
cure Firmware
SW-technology
Small trust and
authentication 
solutions
Automotive,
industrial 
control
ongoing
Standard
security 
patent 
portfolio
IFX and
others
Integrated Trust 
solutions for non 
PC platforms
TC for mobile 
phones,
trusted PDAs,
Trusted Player
intelligent 
mobile devices
ongoing
Standard 
security 
patent 
portfolio
IFX and 
others
Preliminary
system 
description for 
commercial 
version of EFS 
Dual licensed EFS
software
1. Defense
2. Medical 
3. 
Governmental
2009
2010
Dual open
source/com
merical 
license 
model
PORT
Preliminary
system 
description for 
trusted file 
shredding 
Dual licensed
software
Governmental
2009
2010
Dual open
source/com
mercial 
license 
model
PORT
Table 4: Exploitable knowledge achieved
4.3 Description of results
The descriptions of the main outcomes in exploitable knowledge are described below.
4.3.1 CAVEAT and FRAMA-C (formerly PPC)
CEA-LIST   aims   at   developing   tool   prototypes   that   implement   advanced   software 
technologies.   The   Open_TC   project   contributes   to  improve   CEA-LIST   tools   and   lead 
them to commercial versions. Static and dynamic analysis tools are produced by the 
CEA-LIST LSL laboratory, and the new C static analyser PPC might become a future 
innovative   product.   Before   reaching   this   state,   it   needs   much   research   and 
development, funded by international, national and customer specific projects. During 
the   last   steps   of   industrialisation   we   will   certainly   require   the   aid   of   a   software 
Open_TC D10.3
28/38
 
D10.3 Intermediate Dissemination Activities Report and Dissemination Plan V1.0
integrator and distributor to solidify and market the tool. 
The   CAVEAT   C   code   static   analyser   belongs   to   the   same   category   of   tools   and   is 
currently directly distributed pointwise to customers.
4.3.2 Platform Secure Initialization
The exploitable result is a software prototype to enable our partners (like HP, IBM, 
Microsoft, etc.) to build a system running trusted software from a DRTM using AMD 
processor hardware. The product is a prototype and no final product, because it has to 
be integrated with a boot loader or the BIOS and this is platform specific. Systems 
running from a (hardware based) DRTM are not available on mass market now so the 
innovation is in this. AMD talks to its partners and customers in the industry about this 
to   exploit   the   DRTM   feature.   This   esp.   addresses   server   vendors   and   operating 
system/hypervisor   vendors.   Exploitation   of   the   DRTM   prototype   will   happen   via 
licensing the solution to partners so that they can create products. Licensing under an 
open license to the public is to be decided.
4.3.3 XEN with AMDV support
The abstraction layer between XEN and AMDV allows XEN to use the AMD hardware 
support for full virtualisation. The AMDV/XEN abstraction layer is in XEN and available 
for everybody’s use.
4.3.4 Prototype of reduced libc for Mini- OS
Mini-task OS support environment for Xen a working internal prototype with support 
limited to specific set of applications. 
4.3.5 Prototype of library with comms stub
Generic Xen communication library is a working internal prototype.
4.3.6 IAIK/Open_TC Java TPM Tools (jTPM-Tools)
The jTPM Tools provide a set of command line utilities to interact with the system's 
TPM. The tools are based on the IAIK/Open_TC jTSS Wrapper and the IAIK/Open_TC 
TCcert library.The most important features, distinguishing the jTPM Tools from other 
TPM   utilities,   are   the   ability   to   create   Attestation   Identity   Keys   (AIKs)   and   AIK 
certificates as well as the ability to extract the Endorsement Key (EK) certificates from 
Infineon 1.1b and 1.2 TPMs.
4.3.7 IAIK/Open_TC Java TSS Wrapper
The Java TSS Wrapper provides an object oriented Java API for interaction with the TCG 
Software   Stack   (TSS)   for   Java   applications.   The   IAIK/Open_TC   jTSS   Wrapper   is 
developed   and   maintained   at   the   Institute   for   Applied   Information   Processing   and 
Open_TC D10.3
29/38
 
D10.3 Intermediate Dissemination Activities Report and Dissemination Plan V1.0
Communication   (Institut   für   Angewandte   Informationsverarbeitung   und 
Kommunikation,   IAIK,   http://www.iaik.at/)   at   Graz   University   of   Technology 
(
).
4.3.8 IAIK/Open_TC Tccert
IAIK/Open_TC TCcert is a software tool which enables one to create special types of 
certificates, as specified by the Trusted Computing Group.
4.3.9 IAIK XKMS
IAIK Trusted Computing labs release an implementation of the XML Key Management 
Specification (XKMS) (
). As suggested by the TCG in their
"Reference   Architecture   for   Interoperability"   document:   "XKMS   provides   the   most 
attractive solution for credential management for existing CAs in the PKI industry." 
Thus, XKMS is a prime candidate as  a foundation of a Trusted Computing enabled 
public key infrastructure. This release does not (yet) contain the Trusted Computing 
specific   classes.   It   is   a   generic   build,   intended   to   stimulate   public   interoperability 
testing with other XKMS implementations. This release is an alpha build and obviously 
still   buggy.   IAIK   XKMS   is   available   for   download   at   the   Trusted   Java   Sourceforge 
website at:  
http://trustedjava.sourceforge.net
5 Cooperation with external organizations
In   addition   to   the   various   dissemination   activities   reported   above,   the   Open_TC 
consortium has been in close cooperation with external organisations. The involved 
partners and their activities are listed below.
Date
Type
Cooperation
partners
Countries
addressed
Partners
Ongoing 
activity
Participating in the 
standardization work of 
the Trusted Computing 
Group (TCG); bringing 
current TCG pre-standard 
activities early into the 
Open_TC work and 
activities
Research, Higher
education
HP
Open_TC D10.3
30/38
 
D10.3 Intermediate Dissemination Activities Report and Dissemination Plan V1.0
Date
Type
Cooperation
partners
Countries
addressed
Partners
Ongoing
activity, 
multiple 
events per 
year
Participating in the
standardization work of 
the Trusted Computing 
Group (TCG); bringing 
current TCG pre-
standard activities early 
into the Open_TC work 
and activities
TCG
international
IFX, HP, IBM, AMD,
POLITO, IAIK
01/2006
Full cooperation within 
the project Berkely 
trust
industry
international
IFX
18.01. 
2006
Workshop
TSC consortium
International
TEC
02/2006
03/2006
addon to the eMobility
workplan, several 
emails between 
February and March 
2006
European
Commission,
eMobility Group
IFX, RUB, TUD, RHUL
10.04.
2006
Cooperation with
Technical University of 
Darmstadt / Germany
University of
Darmstadt,
Germany
Germany
IFX
21.04.
2006
Meeting and common
research seminar
Higher Education
RUB, IFX
24.04.
2006
Meeting
Research, Higher
education
HP
12.5.
2006
Workshop with Portakal
Internal
workshop
National
TUB, PORT
30.05. 
2006
Cooperation with 
University Karlsruhe
University of
Karlsruhe,
Germany
Germany
IFX
03.-13.06. 
2006
Presentations   in   Korea; 
e.g. With Samsung, LG, 
Postech
University,
Daegu Gyeongbuk
industry and
researchers
TUD
26.-30.06.
2006
Presentation of our L4
work, Nokia, Helsinki
industry
TUD
20.08. 
2006
L4   Presentation,   Intel, 
USA
industry
international
TUD
19-25.08.
2006
European
summer
school   on   Trusted 
Infrastructure 
technologies
CESG (UK), BSI
(DE)
RHUL, RUB, HP,
CUCL, TUD, POL
03-08.09. 
2006
European
summer
school on Trusted
Infrastructure 
technologies
higher education
international
RHUL, RUB, HP,
CUCL, TUD
Open_TC D10.3
31/38
 
D10.3 Intermediate Dissemination Activities Report and Dissemination Plan V1.0
Date
Type
Cooperation
partners
Countries
addressed
Partners
02.11.
2006
OSLO+TC
demonstration,   Intel, 
Hillsboro, USA
industrial
international
TUD
12/2006
Dresden Silicon,
Dresden
Industry
TUD
06.03. 
2007
Workshop with Portakal 
about implementation 
issues and WP5-WP6 
integration
Internal
workshop
National
RUB, Nokia
14.03.
2007
Microsoft Redmond
Industry
TUD
01/2006 – 
04/2007
Telephone conferences; 
discussions (25  2-hour 
telephone conferences)
Software Define
Radio forum;
SDR Security
Working Group
international
RHUL
01/2006 –
10/2006
Discussions, 5 2-hour
telephone   conferences 
and a half-day meeting
Vodafone, TCG
MPWG (Mobile
Phone Work
Group)
RHUL
2006-
2010
Presence and influence 
in standardisation 
committes
OMTP, OMA
international
IFX
2006-
2010
Standardisation for 
embedded processors 
with integrated trusted 
computing
industry, 
research
international
IFX
Since
01/2007
Cryptographic Research
Research
RUB, Philips
Since 
02/2007
Research   on   Trusted 
Channels
Research
Attending correlation
meetings and 
exchanging information
higher education
Austria
TEC
Email contact via David
Jennings
OMTP
IFX
Take part in OMTP 
conference calls and 
meetings  on hardware 
security, and check that 
the WP8 Open_TC 
documents are 
consistent with OMTP 
specifications and 
proposals as they 
become available
industry,
research
international
IFX
Table 5: Cooperation with external organisations
Open_TC D10.3
32/38
 
D10.3 Intermediate Dissemination Activities Report and Dissemination Plan V1.0
6 Participation in running / labeled projects
6.1 Participation in complementary EU/IST projects, Eureka
ITEA
€-confidential
Trusted SW execution based on COTS. 
Trusted Security Platform to secure multi kind of 
application   and   to   provide   a   trustworthy 
execution   environment;   Develop   a   safe   and 
trustworthy   security   platform   that   will   allow   to 
control   and   to   ensure   a   trust   execution   of 
security   services   (authentication,   ciphering,   …) 
for   sensitive   applications   (PMR,   e-vote,   e-bank, 
…) running on COTS.
CEA (labeled but 
waiting for financing)
GGCC
New C Compiler
CEA (labeled and 
financed)
TECOM
R&D from a family of HW/embedded SW silicon
components enforcing secure and trusted 
computing for the areas of consumer, computer, 
telecommunications, and wireless.
Development of a trust concept and architecture 
elements usable in other European industrial 
segments such as automotive, industrial, 
aeronautics (especially in their content 
acquisition and payment, ticketing, and DRM 
aspects)
Relevant European contributions related to 
Trusted Computing standards while keeping 
interoperability with existing US-led or Asian 
initiatives.
IFX, TEC (labeled but
waiting for financing)
MEDEA+
TSC
Trusted Secure Computing was recently labeled
with 2A502 by the public authorities for contract. 
TSC   deals   with   the   deployment   of   PC   oriented 
Trusted Computing usage and applications. It will 
also   sponsor   the   compliance   testing   of   realized 
TC HW and SW against the TCG specification to 
give   the   users   trust   in   the   correctness   of   their 
applications.
TEC, IFX, RUB
IST FP6
IPs
PRIME
Privacy and Identity Management for Europe
To   research   and   develop   approaches   and 
solutions   for   privacy-enhancing   identity 
management   that   can   make   the   European 
citizens   empowered   to   exercise   their   privacy 
rights,   and  thus   enable   them   to   gain  trust  and 
confidence in the information society
HP, KUL, TUD, IBM
Open_TC D10.3
33/38
 
D10.3 Intermediate Dissemination Activities Report and Dissemination Plan V1.0
DESEREC
Dependability and Security by Enhanced 
Reconfigurability
DESEREC will respond efficiently to the three 
families of incidents which can occurs on a 
critical system: Attacks from the outside, Intrinsic 
failures, and Misbehavior or malicious internal 
use.
POL (scientific leader), 
BME
PASR
ROBIN
Open Robust Infrastructure
The   objective   of   this   Preparatory   Action   is   to 
explore   key   technologies   for   a   small,   robust 
platform that can host legacy operating systems 
and their applications, but that is small enough to 
undergo   formal   analysis   and   construction 
techniques.
TUD
GST
Global System for Telematics
To   create   an   open   environment   in   which 
innovative telematics services can be developed 
and delivered cost-effectively.
KUL, TUM
SECOQC
Development   of   a   Global   Network   for   Secure 
Communication based on Quantum Cryptography
HP
DESEREC
Dependability and Security by Enhanced
Reconfigurability
DESEREC   will   respond   efficiently   to   the   three 
families   of   incidents   which   can   occurs   on   a 
critical system: Attacks from the outside, Intrinsic 
failures,   and   Misbehavior   or   malicious   internal 
use. 
POL (scientific leader),
BME
NOE
FIDIS
The Future of Identity in the Information Society
To   shape   the   requirements   for   the   future 
management   of   identity   in   the   European 
information
society and contributing to the technologies and 
infrastructures needed.
KUL, IBM
ECRYPT
To ensure a durable integration of European
research in both, academia and industry, and to 
maintain   and   strengthen   the   European 
excellence in these areas
KUL, RHUL, IBM
ReSIST
ReSIST is a Network of Excellence that integrates 
leading researchers active in the multidisciplinary 
domains of Dependability, Security, and Human 
Factors, in order that Europe will have a well-
focused coherent set of research activities aimed 
at ensuring that future “ubiquitous computing 
systems” (the immense systems of ever-evolving 
networks of computers and mobile devices which 
are needed to support and provide Ambient 
Intelligence), have the necessary resilience and 
survivability, despite any residual development 
and physical faults, interaction mistakes, or 
IBM
Open_TC D10.3
34/38
 
D10.3 Intermediate Dissemination Activities Report and Dissemination Plan V1.0
malicious attacks and disruptions.
STREP
RE-TRUST
Remote Entrusting by Run-time Software
Authentication
To investigate both all-in-software and hardware-
assisted   novel   methodologies   in   order   to   solve 
the problem of  dynamic software authentication 
in   real-time   during   execution    by   employing   a 
trusted   logic   component   on   an   untrusted 
machine that in turn authenticates its operation 
continuously during run-time. 
KUL, POLITO
SPEED
Signal Processing in the Encrypted Domain
To   foster   the   advancement   of   the   marriage 
between   signal   processing   and   cryptographic 
techniques,   both   at   theoretical   and   practical 
level.
KUL, RUB
TEAHA
The European Application Home Alliance
To   provide   the   suitable   communication 
components and interoperability specification for 
home   appliances   and   platforms   such   that 
products   from   different   manufacturers   will   be 
able   to   interoperate   in   order   to   improve   their 
marketability.
KUL
POSITIF
Policy-based Security Tools and Framework.
POSITIF   will   develop   a   framework   and   tools   for 
policy-based   protection   of   networked   systems 
and   applications.   A   multi-level   policy   language 
will   be   used   to   describe   the   desired   security 
policy   (high-level   requirements   and/or   detailed 
controls) while a system language will be used to 
describe   the   target   system   (interconnection 
topology, functional and security capabilities). 
POL (coordinator)
HIDENETS
HIghly DEpendable ip-based NETworks and
Services
The aim of HIDENETS is to develop and analyze 
end-to-end   resilience   solutions   for   distributed 
applications   and   mobility-aware   services   in 
ubiquitous   communication   scenarios.   Technical 
solutions will be developed for applications with 
critical dependability requirements in the context 
of   selected   use-cases   of   ad-hoc   car-to-car 
communication   with   infrastructure   service 
support. 
BME
CA
Open_TC D10.3
35/38
 
D10.3 Intermediate Dissemination Activities Report and Dissemination Plan V1.0
ESFORS
European   Security   Forum   for   web   services, 
software, and systems
ESFORS   is   a   Coordination   Action   that   aims   to 
bring   the   European   stakeholders   together   for 
security   and   dependability   Information,   and 
Communication   Technologies   (ICTs)   to   address 
the   security   and  dependability   requirements   of 
emerging software service platforms. 
HP
Table 6: Participation in EU/IST projects
6.2 Participation in national projects
Germany
EMSCB
European Multi-lateral Secure Computing Base
This   is   a   German   national   project,   started   in 
October   2004   and   sponsored   by   the   German 
Ministry   of   Economics.   The   project   targets   the 
acquisition   of   a   first   Trusted   Computing 
experience   through   the   development   of   some 
Trusted  Components, including Tamper  devices, 
HDD encryption, DRM viewers. Relation with TSC 
will   be   established   through   Infineon,   Ruhr 
University Bochum, and EMSCB partners
RUB, TUD, IFX
VFiasco
A DFG Project that aims to verify  some security 
relevant properties of a complete µ-kernel.
See:
http://os.inf.tu-dresden.de/vfiasco/
for
details.
TUD
France
System@Tic 
project PFC (Plate-
Forme de 
Confiance)
The competitiveness pole System@Tic deals with 
complex hardware and software systems and is 
financed by the Paris area. PFC proposes to 
develop a platform that allows companies, 
administrations and citizen to build reliable and 
trusted information systems and associated 
processes. More generally, the aim is to increase 
the control of all the technological, legal and 
societal aspects bound to the development of e-
activities.
CEA (labeled and 
waiting for financing)
RNTL project CAT
Static analysis tools for the C language.
CEA (labeled and
financed)
United Kingdom
XenSE
Xen: Security Enhanced. EPSRC national research
project   involving   CUCL,   Intel   Research 
Cambridge, and CESG. This will build a prototype 
system for trusted computing which aims to be 
architecturally compatible with the output of the 
Open_TC   project   work.   Particular   focus   on 
usability and desktop aspects. 
CUCL
Trust
The goal of this EPSRC-funded 3-year project is to RHUL
Open_TC D10.3
36/38
 
D10.3 Intermediate Dissemination Activities Report and Dissemination Plan V1.0
Establishment in 
Mobile Distributed 
Computing 
Platforms
establish a secure association between a mobile 
wireless   device   (or   network)   and   the   grid.   It 
involves studying the problem of the applicability 
of TC-elements  to distributed systems, and grid 
in   particular.   The   use   of   DRM   techniques   to 
protect data on the grid are being investigated.
Hungary
CCLAB
Project   for   establishing   an   accredited   Common 
Criteria evaluation laboratory
BME
Austria
KIRAS
Introduction of Trusted Computing for the
Austrian Government
TEC (coordinator),
TUG
Table 7: Participation in national projects
Open_TC D10.3
37/38
 
D10.3 Intermediate Dissemination Activities Report and Dissemination Plan V1.0
7 List of Abbreviations
The abbreviations referring to the Open_TC project partners are explained below.
TEC
Technikon Forschungs- und Planungsgesellschaft mbH
IFX
Infineon Technologies AG
HP
Hewlett-Packard Ltd
IAIK
Graz University of Technology
LDV
Lehrstuhl für Datenverarbeitung, Technische Universität München
SUSE
SUSE Linux Products GmbH
RHUL
Royal Holloway and Bedford New College
ITAS
Forschungszentrum Karlsruhe GmbH
TUB
TUBITAK, National Research Institute of Electronics & Cryptology
POL
Politecnico di Torino
BME
Budapest University of Technology and Economics
CEA
Commissariat à l’Energie Atomique-LIST
RUB
Horst Goertz Institute for IT Security, Ruhr-University Bochum
TUD
Technische Universität Dresden
CUCL
University of Cambridge Computer Laboratory
IBM
IBM Research GmbH
ISE
Institute for Security and Open Methodologies
AMD
Advanced Micro Devices
PORT
Portakal Teknoloji Egitim Danismanlik Yazilim Turizm Taahhut
INTEK
Intek
TUS
Technical University of Sofia
KUL
Katholieke Universiteit Leuven
COM
Comneon GmbH
Open_TC D10.3
38/38