6,004 Hits in 9.4 sec

A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise [article]

Ivan De Oliveira Nunes, Karim Eldefrawy, Norrathep Rattanavipanon, Gene Tsudik
2020 arXiv   pre-print
In this paper we answer these questions by designing, proving security of, and formally verifying, VAPE: Verified Architecture for Proofs of Execution.  ...  Furthermore, (3) Is it possible to attain (1) and (2) under the assumption that all software on the remote device could be modified or compromised?  ...  To the best of our knowledge, this is the first security architecture for proofs of remote software execution on low-end devices.  ... 
arXiv:1908.02444v2 fatcat:ttsnger7sncpjpxoyefhllgvdu

ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices

N. Asokan, Thomas Nyman, Norrathep Rattanavipanon, Ahmad-Reza Sadeghi, Gene Tsudik
2018 IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems  
Prior techniques, designed for other computational settings, are not readily suitable for IoT devices, since they do not consider idiosyncrasies of a realistic large-scale IoT deployment.  ...  This motivates our design of ASSURED, a secure and scalable update framework for IoT.  ...  Remote Attestation Remote attestation is a process whereby a trusted entity (verifier) remotely measures internal state of a untrusted and possible compromised device (prover), in order to determine whether  ... 
doi:10.1109/tcad.2018.2858422 fatcat:xtblhx7qfngx3nanazcdwzqo54

A Survey on Hardware Approaches for Remote Attestation in Network Infrastructures [article]

Ioannis Sfyrakis, Thomas Gross
2020 arXiv   pre-print
Remote attestation schemes have been utilized for assuring the integrity of a network node to a remote verifier.  ...  In this report, we focus on remote attestation schemes that use a hardware device and cryptographic primitives to assist with the attestation of nodes in a network infrastructure.  ...  One such case is when a tenant verifier asks a cloud provider that software integrity of her virtualized host is not compromised.  ... 
arXiv:2005.12453v3 fatcat:kjyi2rohtzgxxepbvsodlbygnm


Ghada Dessouky, Shaza Zeitouni, Thomas Nyman, Andrew Paverd, Lucas Davi, Patrick Koeberl, N. Asokan, Ahmad-Reza Sadeghi
2017 Proceedings of the 54th Annual Design Automation Conference 2017 on - DAC '17  
Attacks targeting software on embedded systems are becoming increasingly prevalent. Remote attestation is a mechanism that allows establishing trust in embedded devices.  ...  We show that our proof-of-concept implementation based on a RISC-V SoC incurs no processor stalls and requires reasonable area overhead.  ...  burden on the verifier ( §4). • A proof-of-concept implementation of LO-FAT on the new open-source RISC-V architecture targeting the Pulpino core for single-threaded embedded system software ( §5). •  ... 
doi:10.1145/3061639.3062276 dblp:conf/dac/DessoukyZNPDKAS17 fatcat:senl3mn3eff45omfhimjd6ggfq


Samuel Weiser, Mario Werner
2017 Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy - CODASPY '17  
However, operating systems often fall victim to software attacks, compromising security of applications as well.  ...  This work presents SGXIO, a generic trusted path architecture for SGX, allowing user applications to run securely on top of an untrusted OS, while at the same time supporting trusted paths to generic I  ...  Acknowledgments This work was partially supported by the TU Graz LEAD project "Dependable Internet of Things in Adverse Environments".  ... 
doi:10.1145/3029806.3029822 dblp:conf/codaspy/WeiserW17 fatcat:gs5qrfd7cbdmziwrzwgffg73gq

PriRoster: Privacy-preserving Radio Context Attestation in Cognitive Radio Networks

Ruide Zhang, Ning Wang, Ning Zhang, Zheng Yan, Wenjing Lou, Y. Thomas Hou
2019 2019 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN)  
First, we propose a privacy-preserving design for single device remote attestation.  ...  Spectrum shortage is becoming a global concern and cognitive radio network (CRN) is envisioned to be one of the key technologies for overcoming this challenge.  ...  Remote attestation of software on a prover for a single appraiser is well studied. The prover is the device under attested and it sends a status report of its current execution state to a appraiser.  ... 
doi:10.1109/dyspan.2019.8935740 dblp:conf/dyspan/ZhangWZ0LH19 fatcat:alv4qz7fvrhl7oc772chgdhqge

D4.2 - Remote attestation of workloads in ITEEs

RISE Research Institutes Of Sweden AB, UBITECH, SECURA BV
2020 Zenodo  
This deliverable contains a set of protocols for remote attestation of ITEEs on commodity platforms.  ...  Remote attestation: the Prover is located on a remote device, hence the Verifier also needs to establish trust with the remote TCB [8] .  ...  Software-based attestation SWATT is a software-based approach to remote attestation for network sensor devices without any special hardware support [11] .  ... 
doi:10.5281/zenodo.4022363 fatcat:cwnz3pyc7rhqdervqtumwl73aa

Tiny-CFA: A Minimalistic Approach for Control-Flow Attestation Using Verified Proofs of Execution [article]

Ivan De Oliveira Nunes, Sashidhar Jakkamsetti, Gene Tsudik
2020 arXiv   pre-print
Hybrid trust anchors support security services, such as remote attestation, proofs of software update/erasure/reset, proofs of remote software execution, in resource-constrained MCU-s, e.g., MSP430 and  ...  In this work, we tackle this challenge by designing Tiny-CFA - a control-flow attestation (CFA) technique with a single hardware requirement - the ability to generate proofs of remote software execution  ...  Remote Attestation (RA) As mentioned earlier, RA allows a trusted verifier (Vrf) to detect unauthorized code modifications (e.g., malware infections) on an untrusted remote device, called a prover (Prv  ... 
arXiv:2011.07400v2 fatcat:omjsmbsr6fbiflwm6rf3rdzrpm

RAitc: Securely Auditing the Remotely Executed Applications

Lei Zhou, Entao Luo, Guojun Wang
2020 IEEE Access  
SYSTEM ARCHITECTURE The goal of RAitc is to effectively audit remote applications in a trustworthy manner to provide clean services for remote users.  ...  We first request a remote platform CSP r for remote computation, and verify that device CSP c is created as requested.  ... 
doi:10.1109/access.2020.3021033 fatcat:nse66ic4ibbyrbqgkrd423iy2y

Formally Verified Hardware/Software Co-Design for Remote Attestation [article]

Ivan De Oliveira Nunes, Karim Eldefrawy, Norrathep Rattanavipanon, Michael Steiner, Gene Tsudik
2019 arXiv   pre-print
In this work, we take the first step towards formal verification of Remote Attestation (RA) by designing and verifying an architecture called VRASED: Verifiable Remote Attestation for Simple Embedded Devices  ...  VRASED provides a level of security comparable to HW-based approaches, while relying on SW to minimize additional HW costs.  ...  Specifically, it allows a trusted verifier (V rf) to remotely measure the software state of an untrusted remote device (P rv).  ... 
arXiv:1811.00175v4 fatcat:rs3go6hbgjculmzg7njlxxkwmq

On the TOCTOU Problem in Remote Attestation [article]

Ivan De Oliveira Nunes, Sashidhar Jakkamsetti, Norrathep Rattanavipanon, Gene Tsudik
2021 arXiv   pre-print
RATA targets hybrid RA architectures (implemented as Hardware/Software co-designs), which are aimed at low-end embedded devices.  ...  Each is shown to be secure and accompanied by a publicly available and formally verified implementation. Our evaluation demonstrates low hardware overhead of both techniques.  ...  APEX [6] builds on top of VRASED to develop a verified architecture for proofs of remote software execution on low-end devices [6] .  ... 
arXiv:2005.03873v2 fatcat:oewjkublwfgzpl4h773d5lu5q4

FPGA-Based Remote-Code Integrity Verification of Programs in Distributed Embedded Systems

C. Basile, S. Di Carlo, A. Scionti
2012 IEEE Transactions on Systems Man and Cybernetics Part C (Applications and Reviews)  
This paper proposes the use of reconfigurable computing to build a consistent architecture for generating attestations (proofs) of code integrity for an executing program, and for delivering them to the  ...  Remote dynamic update of reconfigurable devices is also exploited to increase the complexity of mounting attacks in a real-word environment.  ...  U is a microprocessor based embedded device where P is executed under full control of the attacker.  ... 
doi:10.1109/tsmcc.2011.2106493 fatcat:7sbaap5yarhplci7kentk42qhq

A Protocol for Preventing Insider Attacks in Untrusted Infrastructure-as-a-Service Clouds

Imran Khan, Zahid Anwar, Behzad Bordbar, Eike Ritter, Habib-ur Rehman
2016 IEEE Transactions on Cloud Computing  
ACKNOWLEDGMENTS We wish to thank Chris Dalton from HP lab Bristol for his valuable advice and many enjoyable discussions.  ...  A PAL is a piece of application logic that performs a well defined task. Flicker executes the PAL in full isolation on the system from all other software and hardware (including OS and VMM).  ...  Flicker architecture employs a TPM chip based on Intel's Trusted eXecution Technology (TXT) for storage of session configuration representing a hash of the computation.  ... 
doi:10.1109/tcc.2016.2560161 fatcat:4oxuiswnonajndf7kbr2o6uyxm

Integrity verification of Docker containers for a lightweight cloud environment

Marco De Benedictis, Antonio Lioy
2019 Zenodo  
This paper presents a solution for security monitoring of a lightweight cloud infrastructure, which exploits Remote Attestation to verify the software integrity of cloud applications during their whole  ...  Remote Attestation is a well-known technique to assess the software integrity of a node.  ...  Tao Su for his valuable contribution in the creation of a first prototype of DIVE.  ... 
doi:10.5281/zenodo.3267028 fatcat:paxhe3z3ifdy5bmvmbkcer4jyq

Secure Code Updates for Mesh Networked Commodity Low-End Embedded Devices [chapter]

Florian Kohnhäuser, Stefan Katzenbeisser
2016 Lecture Notes in Computer Science  
Second, the scheme must ensure that, appropriately executed, it restores the integrity of the software state on a device, even if the device was compromised before.  ...  However, compromised devices can simply deny the execution of code updates or execute them inappropriately without restoring software integrity.  ...  [39] applied a software-based approach to ensure an untampered execution of the software update protocol on a single remote device.  ... 
doi:10.1007/978-3-319-45741-3_17 fatcat:4blcbnzm6ncbva5c5ft6ux5t6u
« Previous Showing results 1 — 15 out of 6,004 results