Using mobile phones to enhance computing platform trust

被引:0
作者
Feng, Wei [1 ]
Qin, Yu [1 ]
Feng, Dengguo [1 ]
机构
[1] Chinese Acad Sci, Trusted Comp & Informat Assurance Lab, Inst Software, Beijing 100190, Peoples R China
基金
中国国家自然科学基金;
关键词
Trusted computing; Remote attestation; Secure communication; Formal model; Mobile device; SYSTEMS;
D O I
10.1007/s11235-018-0456-y
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This paper presents a new method to enhance the trust of traditional computing device by using the popular mobile phone. We first propose a formal method to analyze the platform trust establishment process based on trusted computing technology, and the formal results reveal possible attack and suggest potential solutions. Then, we design an improved solution, in which the mobile phone is extended to support three trusted computing functions: using mobile phone as a root of trust instead of Trusted Platform Module, as a local investigator to obtain evidences from the local computing platform, and as a trusted agent to build a secure communication channel with an external entity in the remote attestation applications. Finally, to describe the feasibility and efficiency, a prototype of the trusted mobile phone is implemented and evaluated based on an ARM development board.
引用
收藏
页码:187 / 205
页数:19
相关论文
共 39 条
  • [1] Aaraj N, 2007, P C DES AUT TEST EUR
  • [2] Analysis and Design of a Hardware/Software Trusted Platform Module for Embedded Systems
    Aaraj, Najwa
    Raghunathan, Anand
    Jha, Niraj K.
    [J]. ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2008, 8 (01)
  • [3] [Anonymous], 2007, TR2007597 DARTM COLL
  • [4] [Anonymous], P ACM WORKSH SCAL TR
  • [5] ARM, 2009, ARM SECURITY TECHNOL
  • [6] Bryan P, 2008, P 3 USENIX WORKSH HO
  • [7] Chen L., 2009, Technical report
  • [8] Principles of remote attestation
    Coker, George
    Guttman, Joshua
    Loscocco, Peter
    Herzog, Amy
    Millen, Jonathan
    O'Hanlon, Brian
    Ramsdell, John
    Segall, Ariel
    Sheehy, Justin
    Sniffen, Brian
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2011, 10 (02) : 63 - 81
  • [9] A Logic of Secure Systems and its Application to Trusted Computing
    Datta, Anupam
    Franklin, Jason
    Garg, Deepak
    Kaynar, Dilsun
    [J]. PROCEEDINGS OF THE 2009 30TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2009, : 221 - 236
  • [10] Dietrich K, 2009, P 2 INT C TRUST COMP