Building a trusted computing base