Policy-Based Implicit Attestation for Microkernel-Based Virtualized Systems

被引:0
作者
Wagner, Steffen [1 ]
Eckert, Claudia [2 ]
机构
[1] Fraunhofer Inst AISEC, Munich, Germany
[2] Tech Univ Munich, Munich, Germany
来源
INFORMATION SECURITY, (ISC 2016) | 2016年 / 9866卷
关键词
Remote attestation; Trusted platform module; Policy; Data integrity; Microkernel;
D O I
10.1007/978-3-319-45871-7_19
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present an attestation mechanism that enables a remote verifier to implicitly evaluate the trustworthiness of the prover's system through policies. Those policies are verified and enforced by a TPM 2.0, when the attestor interacts with a virtualized hardware component of the prover's system. For instance, when the verifier reads a virtualized sensor device and requests integrity-protected sensor data, such as the average temperature, a heartbeat value, or an anomaly detection score, the prover's TPM, which acts as a trust anchor, checks and enforces the policies specified by the verifier. The prover, in turn, is also able to define policies, which can limit access to certain hardware components and are also enforced by the TPM. As a result, both parties have to cooperate for a successful attestation, which implicitly creates verifiable proof of the prover's trustworthiness using mainly symmetric instead of expensive asymmetric cryptographic operations like digital signatures.
引用
收藏
页码:305 / 322
页数:18
相关论文
共 14 条
  • [1] Alsouri S, 2010, LECT NOTES COMPUT SC, V6101, P63, DOI 10.1007/978-3-642-13869-0_5
  • [2] [Anonymous], 2004, P 3 C VIRT MACH RES
  • [3] ARM Limited, 2010, VIRT EXT ARCH SPEC
  • [4] ARM Ltd, 2012, 040CB ARM LTD DDI
  • [5] ARM Ltd, 2011, 0438C ARM LTD DDI
  • [6] Brickell E., 2004, P ACM C COMP COMM SE, P132, DOI DOI 10.1109/TSC.2010.60
  • [7] Danial A., CLOC COUNT LINES COD
  • [8] Krawczyk H, 1998, Chameleon hashing and signatures
  • [9] LIEDTKE J, 1996, P 5 IEEE INT WORKSH
  • [10] Neiger G., 2006, Intel Technology Journal, V10, P167