28,324 Hits in 3.8 sec

A protocol for property-based attestation

Liqun Chen, Rainer Landfermann, Hans Löhr, Markus Rohe, Ahmad-Reza Sadeghi, Christian Stüble
2006 Proceedings of the first ACM workshop on Scalable trusted computing - STC '06  
Based on previous works, we propose a concrete efficient property-based attestation protocol within an abstract model for the main functionalities provided by TCG-compliant platforms.  ...  A recent proposal to overcome these problems is to transform the binary attestation into property-based attestation, which requires to only attest whether a platform or an application fulfills the desired  ...  We propose a provably secure protocol for property-based attestation that concretely implements the delegation-based solution sketched above.  ... 
doi:10.1145/1179474.1179479 dblp:conf/ccs/ChenLLRSS06 fatcat:eahxthe3qfb77kbrhhnjddmyzy

A property-based attestation protocol for TCM

DengGuo Feng, Yu Qin
2010 Science China Information Sciences  
This paper presents a property attestation protocol for the security chip TCM (trusted cryptographic module) via analyzing the problems of the current property attestation, which is built on the property  ...  The protocol can help extend application and improve standard for security chip TCM, and it also has practical value and immediate significance.  ...  [11] proposed the first property-based attestation protocol in 2006 (PBA protocol for short).  ... 
doi:10.1007/s11432-010-0057-1 fatcat:imjihrjyhbcrpiyp5veidxwcwe

Property-Based Anonymous Attestation in Trusted Cloud Computing

Zhen-Hu Ning, Wei Jiang, Jing Zhan, Peng Liang
2014 Journal of Electrical and Computer Engineering  
We also expand the protocol and obtain the anonymous attestation based on ECC.  ...  To overcome these defects, based on the research on and analysis of current schemes, we propose an anonymous proof protocol based on property certificate.  ...  Based on [20] , the paper in [21] proposed a protocol for property-based attestation.  ... 
doi:10.1155/2014/687158 fatcat:rqu4tjtqpvanhlgmo4gonwqqny

Remote Attestation: A Literature Review [article]

Alexander Sprogø Banks, Marek Kisiel, Philip Korsholm
2021 arXiv   pre-print
Traditional remote attestation protocols are concerned with reasoning about the state of a prover.  ...  We will describe and evaluate the state-of-the-art for remote attestation, which covers singular attestation of devices as well as newer research in the area of formally verified RA protocols, swarm attestation  ...  Properties of swarm attestation protocols A different set of properties will be used to describe swarm attestation protocols.  ... 
arXiv:2105.02466v2 fatcat:wpzlezruovat5c35b465xkzb44

Property-based attestation for computing platforms

Ahmad-Reza Sadeghi, Christian Stüble
2005 Proceedings of the 2004 workshop on New security paradigms - NSPW '04  
We also demonstrate, how a property-based attestation protocol can be realized based on the existing TC hardware such as a Trusted Platform Module (TPM).  ...  Thus, a property-based attestation should only verify whether these properties are sufficient to fulfill certain (security) requirements of the party who asks for attestation.  ...  To use a proof of membership protocol for property-based attestation, the TTP publishes a list of all platform configurations S1 . . . Sn that provide a specific property P .  ... 
doi:10.1145/1065907.1066038 dblp:conf/nspw/SadeghiS04 fatcat:wtznwoggk5fcpgkasqrbbtw3d4

A minimalist approach to Remote Attestation

Aurelien Francillon, Quan Nguyen, Kasper B. Rasmussen, Gene Tsudik
2014 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2014  
properties.  ...  However, one common theme is the need for Remote Attestation, a distinct security service that allows a trusted party (verifier) to check the internal state of a remote untrusted embedded device (prover  ...  In Section IV, we identify properties required for Attest to provide secure remote attestation. A. System Model The central goal of any remote attestation protocol is to verify Prov's state.  ... 
doi:10.7873/date.2014.257 dblp:conf/date/FrancillonNRT14 fatcat:atnc25whezbzbdtuqrwm3pt7ie

UPBA: User-Authenticated Property-Based Attestation

M. Manulis, M. Steiner
2011 2011 Ninth Annual International Conference on Privacy, Security and Trust  
While classical binary attestation attests the configuration itself, property-based attestation (PBA) attests properties and thus offers higher privacy guarantees to the host and its user.  ...  The User-Authenticated Property-Based Attestation (UPBA), introduced in this work, can assure a remote party that some computing platform is trustworthy, and that it is used at that very moment by some  ...  This limitation has been informally addressed in [27] with the establishing of session keys within the attestation protocol. Property-based attestation (PBA).  ... 
doi:10.1109/pst.2011.5971972 dblp:conf/pst/ManulisS11 fatcat:gpcprpa7brc7vly2nvv53ya72m

Secure Code Update for Embedded Devices via Proofs of Secure Erasure [chapter]

Daniele Perito, Gene Tsudik
2010 Lecture Notes in Computer Science  
Remote attestation is the process of verifying internal state of a remote embedded device. It is an important component of many security protocols and applications.  ...  One notable alternative is software-based attestation which is both less costly and more efficient.  ...  Acknowledgments The authors would like to thank ... for his helpful feedback and editorial suggestions.  ... 
doi:10.1007/978-3-642-15497-3_39 fatcat:cyzd6zaoyfbijfwmspomhj2iaq

A practical property-based bootstrap architecture

René Korthaus, Ahmad-Reza Sadeghi, Christian Stüble, Jing Zhan
2009 Proceedings of the 2009 ACM workshop on Scalable trusted computing - STC '09  
In this paper we focus on property-based bootstrap architectures with an enhanced boot loader.  ...  Finally, we show how our architecture can be applied to secure boot mechanisms of Mobile Trusted Modules (MTM) to realize a "Property-Based Secure Boot".  ...  Property-Based Attestation As depicted in Figure 4 , the property-based attestation protocol is compatible with the binary-based protocol.  ... 
doi:10.1145/1655108.1655114 dblp:conf/ccs/KorthausSSZ09 fatcat:tl6yefgmnbeqtgi3jmo5aaboka

A Method for Trusted Usage Control over Digital Contents Based on Cloud Computing

Tao Huang, Zhiyong Zhang, Qingli Chen, Yanan Chang
2013 International Journal of Digital Content Technology and its Applications  
Based on cloud computing and remote certification, this paper proposed a usage control architecture and bidirectional integrality verification security protocol of multimedia digital contents in cloud  ...  DRM controller is set in cloud multimedia server by as a service, and user calls DRM controlling function through client GUI.  ...  The signature algorithm for the bidirectional integrity attestation security protocol is the RSA algorithm based on asymmetric turbo code system and SHA-1 algorithm is adopted as the hash algorithm.  ... 
doi:10.4156/jdcta.vol7.issue4.95 fatcat:zcua5f5is5cxtcppv7zfuziuqu

Maat: A Platform Service for Measurement and Attestation [article]

J. Aaron Pendergrass, Sarah Helble, John Clemens, Peter Loscocco
2017 arXiv   pre-print
Software integrity measurement and attestation (M&A) are critical technologies for evaluating the trustworthiness of software platforms.  ...  Maat is a platform service that provides a centralized policy-driven framework for determining which measurement tools and protocols to use to meet the needs of a given integrity evaluation.  ...  This will allow for negotiations based on properties of attestations rather than well known UUIDs.  ... 
arXiv:1709.10147v1 fatcat:33ps56ugfzcrnceh7dovk45i7m

Property-based token attestation in mobile computing

Thinh Le Vinh, Hervé Cagnon, Samia Bouzefrane, Soumya Banerjee
2017 Concurrency and Computation  
By considering the TPM's functionalities, we offer suggestions about a novel schema of property-based attestation suitable for use with the token based authentication.  ...  As a result, the shared PROPERTY BASED TOKEN ATTESTATION IN MOBILE COMPUTING 15 1.  ...  Property based Token Attestation Protocol We start the section by explaining the structure of PTA protocol in high level.  ... 
doi:10.1002/cpe.4350 fatcat:hfwa4ipsozezlopi2gf7ka4qoq

Principles of remote attestation

George Coker, Joshua Guttman, Peter Loscocco, Amy Herzog, Jonathan Millen, Brian O'Hanlon, John Ramsdell, Ariel Segall, Justin Sheehy, Brian Sniffen
2011 International Journal of Information Security  
Remote attestation is the activity of making a claim about properties of a target by supplying evidence to an appraiser over a network.  ...  We illustrate how to acquire evidence from a running system, and how to transport it via protocols to remote appraisers. We propose an architecture for attestation guided by these principles.  ...  These authors and several others go on to propose a protocol for performing such property-based attestations [4] . This protocol could be implemented as an ASP in our system. Kühn et al.  ... 
doi:10.1007/s10207-011-0124-7 fatcat:ljsl65m5cbhdjhkeaaao2dsbzu


Tianwei Zhang, Ruby B. Lee
2015 Proceedings of the 42nd Annual International Symposium on Computer Architecture - ISCA '15  
We show a concrete implementation of property-based attestation and a full prototype based on the OpenStack open source cloud software.  ...  We present an architecture for monitoring a VM's security health, with the ability to attest this to the customer in an unforgeable manner.  ...  We model the authentication and communication procedures of our protocol in ProVerif, and check the secrecy, integrity and authentication properties defined above. Acknowledgements We thank Dr.  ... 
doi:10.1145/2749469.2750422 dblp:conf/isca/ZhangL15 fatcat:w5esq56yazhuflfwf2r3qcenne

Design and Implementation of Remote Anonymous Attestation Protocol Based on Trusted Cloud Computing Platform

Liu Yan, Xia Bin
2015 Open Cybernetics and Systemics Journal  
In this paper, the trusted computing technology and properties of signature mechanism based on the proposed a trusted cloud is simple, safe and efficient computing platform remote anonymous attestation  ...  protocol RAA-TCCP protocol.  ...  And according to the platform integrity state proved that the typical TCG binary proof (Binary Attestation), based on the attributes of the proof of (Property-based Attestation, PBA) etc.  ... 
doi:10.2174/1874110x01509010415 fatcat:h5olhlr3wras3ddlfc5emu64qq
« Previous Showing results 1 — 15 out of 28,324 results