A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
A protocol for property-based attestation
2006
Proceedings of the first ACM workshop on Scalable trusted computing - STC '06
Based on previous works, we propose a concrete efficient property-based attestation protocol within an abstract model for the main functionalities provided by TCG-compliant platforms. ...
A recent proposal to overcome these problems is to transform the binary attestation into property-based attestation, which requires to only attest whether a platform or an application fulfills the desired ...
We propose a provably secure protocol for property-based attestation that concretely implements the delegation-based solution sketched above. ...
doi:10.1145/1179474.1179479
dblp:conf/ccs/ChenLLRSS06
fatcat:eahxthe3qfb77kbrhhnjddmyzy
A property-based attestation protocol for TCM
2010
Science China Information Sciences
This paper presents a property attestation protocol for the security chip TCM (trusted cryptographic module) via analyzing the problems of the current property attestation, which is built on the property ...
The protocol can help extend application and improve standard for security chip TCM, and it also has practical value and immediate significance. ...
[11] proposed the first property-based attestation protocol in 2006 (PBA protocol for short). ...
doi:10.1007/s11432-010-0057-1
fatcat:imjihrjyhbcrpiyp5veidxwcwe
Property-Based Anonymous Attestation in Trusted Cloud Computing
2014
Journal of Electrical and Computer Engineering
We also expand the protocol and obtain the anonymous attestation based on ECC. ...
To overcome these defects, based on the research on and analysis of current schemes, we propose an anonymous proof protocol based on property certificate. ...
Based on [20] , the paper in [21] proposed a protocol for property-based attestation. ...
doi:10.1155/2014/687158
fatcat:rqu4tjtqpvanhlgmo4gonwqqny
Remote Attestation: A Literature Review
[article]
2021
arXiv
pre-print
Traditional remote attestation protocols are concerned with reasoning about the state of a prover. ...
We will describe and evaluate the state-of-the-art for remote attestation, which covers singular attestation of devices as well as newer research in the area of formally verified RA protocols, swarm attestation ...
Properties of swarm attestation protocols A different set of properties will be used to describe swarm attestation protocols. ...
arXiv:2105.02466v2
fatcat:wpzlezruovat5c35b465xkzb44
Property-based attestation for computing platforms
2005
Proceedings of the 2004 workshop on New security paradigms - NSPW '04
We also demonstrate, how a property-based attestation protocol can be realized based on the existing TC hardware such as a Trusted Platform Module (TPM). ...
Thus, a property-based attestation should only verify whether these properties are sufficient to fulfill certain (security) requirements of the party who asks for attestation. ...
To use a proof of membership protocol for property-based attestation, the TTP publishes a list of all platform configurations S1 . . . Sn that provide a specific property P . ...
doi:10.1145/1065907.1066038
dblp:conf/nspw/SadeghiS04
fatcat:wtznwoggk5fcpgkasqrbbtw3d4
A minimalist approach to Remote Attestation
2014
Design, Automation & Test in Europe Conference & Exhibition (DATE), 2014
properties. ...
However, one common theme is the need for Remote Attestation, a distinct security service that allows a trusted party (verifier) to check the internal state of a remote untrusted embedded device (prover ...
In Section IV, we identify properties required for Attest to provide secure remote attestation.
A. System Model The central goal of any remote attestation protocol is to verify Prov's state. ...
doi:10.7873/date.2014.257
dblp:conf/date/FrancillonNRT14
fatcat:atnc25whezbzbdtuqrwm3pt7ie
UPBA: User-Authenticated Property-Based Attestation
2011
2011 Ninth Annual International Conference on Privacy, Security and Trust
While classical binary attestation attests the configuration itself, property-based attestation (PBA) attests properties and thus offers higher privacy guarantees to the host and its user. ...
The User-Authenticated Property-Based Attestation (UPBA), introduced in this work, can assure a remote party that some computing platform is trustworthy, and that it is used at that very moment by some ...
This limitation has been informally addressed in [27] with the establishing of session keys within the attestation protocol. Property-based attestation (PBA). ...
doi:10.1109/pst.2011.5971972
dblp:conf/pst/ManulisS11
fatcat:gpcprpa7brc7vly2nvv53ya72m
Secure Code Update for Embedded Devices via Proofs of Secure Erasure
[chapter]
2010
Lecture Notes in Computer Science
Remote attestation is the process of verifying internal state of a remote embedded device. It is an important component of many security protocols and applications. ...
One notable alternative is software-based attestation which is both less costly and more efficient. ...
Acknowledgments The authors would like to thank ... for his helpful feedback and editorial suggestions. ...
doi:10.1007/978-3-642-15497-3_39
fatcat:cyzd6zaoyfbijfwmspomhj2iaq
A practical property-based bootstrap architecture
2009
Proceedings of the 2009 ACM workshop on Scalable trusted computing - STC '09
In this paper we focus on property-based bootstrap architectures with an enhanced boot loader. ...
Finally, we show how our architecture can be applied to secure boot mechanisms of Mobile Trusted Modules (MTM) to realize a "Property-Based Secure Boot". ...
Property-Based Attestation As depicted in Figure 4 , the property-based attestation protocol is compatible with the binary-based protocol. ...
doi:10.1145/1655108.1655114
dblp:conf/ccs/KorthausSSZ09
fatcat:tl6yefgmnbeqtgi3jmo5aaboka
A Method for Trusted Usage Control over Digital Contents Based on Cloud Computing
2013
International Journal of Digital Content Technology and its Applications
Based on cloud computing and remote certification, this paper proposed a usage control architecture and bidirectional integrality verification security protocol of multimedia digital contents in cloud ...
DRM controller is set in cloud multimedia server by as a service, and user calls DRM controlling function through client GUI. ...
The signature algorithm for the bidirectional integrity attestation security protocol is the RSA algorithm based on asymmetric turbo code system and SHA-1 algorithm is adopted as the hash algorithm. ...
doi:10.4156/jdcta.vol7.issue4.95
fatcat:zcua5f5is5cxtcppv7zfuziuqu
Maat: A Platform Service for Measurement and Attestation
[article]
2017
arXiv
pre-print
Software integrity measurement and attestation (M&A) are critical technologies for evaluating the trustworthiness of software platforms. ...
Maat is a platform service that provides a centralized policy-driven framework for determining which measurement tools and protocols to use to meet the needs of a given integrity evaluation. ...
This will allow for negotiations based on properties of attestations rather than well known UUIDs. ...
arXiv:1709.10147v1
fatcat:33ps56ugfzcrnceh7dovk45i7m
Property-based token attestation in mobile computing
2017
Concurrency and Computation
By considering the TPM's functionalities, we offer suggestions about a novel schema of property-based attestation suitable for use with the token based authentication. ...
As a result, the shared PROPERTY BASED TOKEN ATTESTATION IN MOBILE COMPUTING 15 1. ...
Property based Token Attestation Protocol We start the section by explaining the structure of PTA protocol in high level. ...
doi:10.1002/cpe.4350
fatcat:hfwa4ipsozezlopi2gf7ka4qoq
Principles of remote attestation
2011
International Journal of Information Security
Remote attestation is the activity of making a claim about properties of a target by supplying evidence to an appraiser over a network. ...
We illustrate how to acquire evidence from a running system, and how to transport it via protocols to remote appraisers. We propose an architecture for attestation guided by these principles. ...
These authors and several others go on to propose a protocol for performing such property-based attestations [4] . This protocol could be implemented as an ASP in our system. Kühn et al. ...
doi:10.1007/s10207-011-0124-7
fatcat:ljsl65m5cbhdjhkeaaao2dsbzu
CloudMonatt
2015
Proceedings of the 42nd Annual International Symposium on Computer Architecture - ISCA '15
We show a concrete implementation of property-based attestation and a full prototype based on the OpenStack open source cloud software. ...
We present an architecture for monitoring a VM's security health, with the ability to attest this to the customer in an unforgeable manner. ...
We model the authentication and communication procedures of our protocol in ProVerif, and check the secrecy, integrity and authentication properties defined above.
Acknowledgements We thank Dr. ...
doi:10.1145/2749469.2750422
dblp:conf/isca/ZhangL15
fatcat:w5esq56yazhuflfwf2r3qcenne
Design and Implementation of Remote Anonymous Attestation Protocol Based on Trusted Cloud Computing Platform
2015
Open Cybernetics and Systemics Journal
In this paper, the trusted computing technology and properties of signature mechanism based on the proposed a trusted cloud is simple, safe and efficient computing platform remote anonymous attestation ...
protocol RAA-TCCP protocol. ...
And according to the platform integrity state proved that the typical TCG binary proof (Binary Attestation), based on the attributes of the proof of (Property-based Attestation, PBA) etc. ...
doi:10.2174/1874110x01509010415
fatcat:h5olhlr3wras3ddlfc5emu64qq
« Previous
Showing results 1 — 15 out of 28,324 results