Remote Attestation on Legacy Operating Systems With Trusted Platform Modules

被引:25
作者
Schellekens, Dries [1 ]
Wyseur, Brecht [1 ]
Preneel, Bart [1 ]
机构
[1] Katholieke Univ Leuven, Dept ESAT SCD COSIC, Kasteelpk Arenberg 10, B-3001 Heverlee, Belgium
关键词
remote software authentication; attestation; trusted platform module; timed execution;
D O I
10.1016/j.entcs.2007.10.014
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A lot of progress has been made to secure network communication, e.g., through the use of cryptographic algorithms. However, this offers only a partial solution as long as the communicating end points still suffer from security problems. A number of applications require remote verification of software executing on an untrusted platform. Trusted computing solutions propose to solve this problem through software and hardware changes, typically a secure operating system and the addition of a secure coprocessor respectively. On the other hand, timed execution of code checksum calculations aims for a solution on legacy platforms, but can not provide strong security assurance. We present a mixed solution by using the trusted computing hardware, namely the time stamping functionality of the trusted platform module, in combination with a timing based remote code integrity verification mechanism. In this way, we do not require a secure operating system, but at the same time the overall security of the timed execution scheme can be improved.
引用
收藏
页码:59 / 72
页数:14
相关论文
共 25 条
[1]  
Aucsmith D., 1996, Information Hiding. First International Workshop Proceedings, P317
[2]  
Balacheff B., 2002, TRUSTED COMPUTING PL
[3]  
Brickell E., 2004, ACM CCS 2004, P132, DOI [DOI 10.1109/TSC.2010.60, DOI 10.1145/1030083.1030103]
[4]  
CECCATO M, 2007, 7 IEEE INT WORK C SO
[5]   Virtual leashing: Internet-based software piracy protection [J].
Dvir, O ;
Herlihy, M ;
Shavit, NN .
25TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2005, :283-292
[6]   A trusted open platform [J].
England, P ;
Lampson, B ;
Manferdelli, J ;
Peinado, M ;
Willman, B .
COMPUTER, 2003, 36 (07) :55-+
[7]  
Giffin JT, 2005, 21st Annual Computer Security Applications Conference, Proceedings, P18
[8]  
Haldar V., 2004, VIRT MACH RES TECHN, P29
[9]  
Huelsbergen, 2006, P ACM S INF COMP COM, P189
[10]  
Kauer B., 2007, P USENIX SEC S AUG 6