A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Attestation: Proving Trustability
[chapter]
2014
Building the Infrastructure for Cloud Security
In reponse to the TPMQuote request, the TPM loads the attestation identity key from protected storage in the TPM by using the storage root key (SRK), performs a TPM Quote command, which is used to sign ...
The challenger verifies the signature of the quote and checks the freshness of the quote. 7. ...
doi:10.1007/978-1-4302-6146-9_4
fatcat:awm2ozqipbdytgfzwhomj3o7qa
Principles of remote attestation
2011
International Journal of Information Security
We illustrate how to acquire evidence from a running system, and how to transport it via protocols to remote appraisers. We propose an architecture for attestation guided by these principles. ...
We argue that (i) attestation must be able to deliver temporally fresh evidence; (ii) comprehensive information about the target should be accessible; (iii) the target, or its owner, should be able to ...
We have analyzed this protocol in detail using CPSA. CPSA is a Cryptographic Protocol Shapes Analyzer [9] , and it was extremely useful in the process of refining CAVES. ...
doi:10.1007/s10207-011-0124-7
fatcat:ljsl65m5cbhdjhkeaaao2dsbzu
Principles of Layered Attestation
[article]
2016
arXiv
pre-print
Some methods of layered attestation are more trustworthy than others, so it is important for system designers to understand the trust consequences of different system configurations. ...
Attestations of such systems, which we call layered attestations, must bundle together the results of a diverse set of application-specific measurements of various parts of the system. ...
Finally, thanks also to Sarah Helble and Aaron Pendergrass for lively discussions about measurement and attestation systems. ...
arXiv:1603.01244v1
fatcat:u5tqkbtsvfgwxc2lpocclaziua
SEDAT:Security Enhanced Device Attestation with TPM2.0
[article]
2021
arXiv
pre-print
SEDAT is the first remote verifier that is capable of retrieving a TPM2.0 quote from prover and validate it after regeneration, using a software TPM2.0 quote check. ...
SEDAT is the first implementation, to the best of our knowledge, that showcases end to end hardware, firmware, and software remote attestation using Trusted Platform Module (TPM2.0) which is resilient ...
Therefore, we analyzed the requirements for designing a secure attestation protocol and depict how to address them with minimal features and assumptions. ...
arXiv:2101.06362v1
fatcat:pae52saonzhcjalygelobkthni
Verifying a Privacy CA Remote Attestation Protocol
[chapter]
2013
Lecture Notes in Computer Science
This work presents results of an effort to specify and verify an abstract TPM 1.2 model using PVS that is useful for understanding the TPM and verifying protocols that utilize it. ...
Postconditions and invariants are specified for individual commands and validated by verifying a Privacy CA attestation protocol. ...
We formally specify and verify a remote attestation protocol -known as the Privacy CA Protocol -using commands from TPM version 1.2. ...
doi:10.1007/978-3-642-38088-4_27
fatcat:n36kxbxqxfatpmh4wfn3zu73mm
Behavioral attestation for web services (BA4WS)
2008
Proceedings of the 2008 ACM workshop on Secure web services - SWS '08
Existing web service standards are used to incorporate remote attestation at the web services level and a prototype is presented, which implements XACML behavior policy using low-level attestation techniques ...
Remote Attestation is a relatively new field of research which enables an authorized party to verify that a trusted environment actually exists on a partner platform. ...
Moreover, it also analyzes the information flow to and from the target application using seLinux [2] policies. ...
doi:10.1145/1456492.1456496
dblp:conf/sws/AlamZNA08
fatcat:rhn5clshtbhu5hsyxkfovkb2dy
RepCloud: Attesting to Cloud Service Dependency
2017
IEEE Transactions on Services Computing
Experiments showed that besides achieving fine-grained cloud service dependency attestation, RepCloud incurred lower trust management overhead than the existing trusted cloud systems. ...
With RepCloud, cloud customers are able to determine the properties of the exact nodes that may affect the genuine functionalities of their applications, without obtaining much internal information of ...
The Attestation Module thus actively quotes its TPM's PCRs for the Dom0. It generates an attestation ticket with an updated nonce value using the nonce updating protocol in [28] . ...
doi:10.1109/tsc.2016.2558513
fatcat:fp2mrjcr6bb33gi6zqaqc5qvju
User-Based Attestation for Trustworthy Visual Sensor Networks
2010
2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing
In this work, we propose to use Trusted Computing to enhance the security of camera systems and, by enabling user-based attestation, give users a simple and intuitive way to check the trustworthiness of ...
Today's systems however do not provide mechanisms that allow monitored people to verify that a camera system is behaving as advertised by its operators. ...
Table 2 2 shows our user-based attestation protocol. ...
doi:10.1109/sutc.2010.20
dblp:conf/sutc/WinklerR10
fatcat:3kasqjd2wjbbva77x3uypx7qpy
Demystifying Attestation in Intel Trust Domain Extensions via Formal Verification
2021
IEEE Access
We believe that TD attestation protocol will be used in the future as a unified approach for TD and SGX attestation. ...
Ch can use the attestation-verification service to verify the Quote. ...
doi:10.1109/access.2021.3087421
fatcat:dgmei3vipfdytbrzkzep7vpamu
TrustVisor: Efficient TCB Reduction and Attestation
2010
2010 IEEE Symposium on Security and Privacy
TrustVisor can also attest the existence of isolated execution to an external entity. ...
An important security challenge is to protect the execution of security-sensitive code on legacy systems from malware that may infect the OS, applications, or system devices. ...
Figure 5 : 5 Attestation protocol. ...
doi:10.1109/sp.2010.17
dblp:conf/sp/McCuneLQZDGP10
fatcat:gw3fmn6h5zdubjcvoj7uvxxrke
Property-based token attestation in mobile computing
2017
Concurrency and Computation
Second, our proposed protocol is verified by using Scyther which is a cryptographic protocol verification tool. ...
In addition, Scyther is in use to verify the correctness of our protocol. ...
SECURITY DISCUSSION To address the common threats in section 3, we analyze the security of our proposed protocol while using Scyther tool for verification of security protocol. ...
doi:10.1002/cpe.4350
fatcat:hfwa4ipsozezlopi2gf7ka4qoq
Maat: A Platform Service for Measurement and Attestation
[article]
2017
arXiv
pre-print
Maat is a platform service that provides a centralized policy-driven framework for determining which measurement tools and protocols to use to meet the needs of a given integrity evaluation. ...
Software integrity measurement and attestation (M&A) are critical technologies for evaluating the trustworthiness of software platforms. ...
TPM quotes are a common form of evidence used to verify that the platform software was valid at platform startup. ...
arXiv:1709.10147v1
fatcat:33ps56ugfzcrnceh7dovk45i7m
An Analysis of the CAVES Attestation Protocol using CPSA
[article]
2012
arXiv
pre-print
This paper describes the CAVES attestation protocol and presents a tool-supported analysis showing that the runs of the protocol achieve stated goals. ...
The goals are stated formally by annotating the protocol with logical formulas using the rely-guarantee method. The protocol analysis tool used is the Cryptographic Protocol Shape Analyzer. ...
The protocol analysis tool used is the Cryptographic Protocol Shape Analyzer (CPSA) [4] . ...
arXiv:1207.0418v1
fatcat:vlpb3xikl5gzpcskdggyxul3za
Confidential Attestation: Efficient in-Enclave Verification of Privacy Policy Compliance
[article]
2020
arXiv
pre-print
Given that the conventional solutions do not work well under the resource-limited and TCB-frugal TEE, we propose a new design that allows an untrusted out-enclave generator to analyze the source code of ...
Also, the whole consumer can be made public and verified through a conventional attestation. We implemented this model on Intel SGX and demonstrate that it introduces a very small part of TCB. ...
The QE signs the report using the attestation key and the generated quote is forwarded to the Intel Attestation Service (IAS). ...
arXiv:2007.10513v1
fatcat:p23pajyac5hhvcszvc5els4ap4
Remote attestation to dynamic system properties: Towards providing complete system integrity evidence
2009
2009 IEEE/IFIP International Conference on Dependable Systems & Networks
To address this problem we present a novel remote dynamic attestation system named ReDAS (Remote Dynamic Attestation System) that provides integrity evidence for dynamic system properties. ...
Our prototype implementation and evaluation with real-world applications show that we can improve on current static attestation techniques with an average performance overhead of 8%. ...
The attestation service also uses the Tspi TPM Quote function to get the TPM to sign the value of PCR 8 and the nonce value. ...
doi:10.1109/dsn.2009.5270348
dblp:conf/dsn/KilSANZ09
fatcat:glb2cyjpmbeabn4g435brmstlm
« Previous
Showing results 1 — 15 out of 6,481 results