ERASMUS: Efficient Remote Attestation via Self- Measurement for Unattended Settings
نویسندگان
چکیده
Remote attestation (RA) is a popular means of detecting malware in embedded and IoT devices. RA is usually realized as an interactive protocol, whereby a trusted party – verifier – measures integrity of a potentially compromised remote device – prover. Early work focused on purely softwarebased and fully hardware-based techniques, neither of which is ideal for low-end devices. More recent results have yielded hybrid (SW/HW) security architectures comprised of a minimal set of features to support efficient and secure RA on
منابع مشابه
Mutual Remote Attestation: Enabling System Cloning for TPM Based Platforms
We describe a concept of mutual remote attestation for two identically configured trusted (TPM based) systems. We provide a cryptographic protocol to achieve the goal of deriving a common session key for two systems that have verified each other to be a clone of themselves. The mutual attestation can be applied to backup procedures without providing data access to administrators, i. e. one trus...
متن کاملSecure Code Update for Embedded Devices via Proofs of Secure Erasure
Remote attestation is the process of verifying internal state of a remote embedded device. It is an important component of many security protocols and applications. Although previously proposed remote attestation techniques assisted by specialized secure hardware are effective, they not yet viable for low-cost embedded devices. One notable alternative is software-based attestation, that is both...
متن کاملRemote Attestation of Heterogeneous Cyber-Physical Systems: The Automotive Use Case
Cyber-Physical Systems (CPS) are increasingly permeating our daily lives, particularly in the automotive domain since a modern vehicle can be regarded as one complex CPS. Given their increasing importance, CPS (and automotive systems as a representative case) are becoming attractive targets for attacks. Several techniques with varying assumptions and limitations have been proposed to detect and...
متن کاملRemote Attestation on Function Execution
A program is a compound of various subroutines playing different roles. In this paper, we study how to attest the execution of those mission-critical subroutines whose execution is the basis to establish trust. Our results include a new attestation scheme called function attestation. Given a function F of a program P , the proposed scheme allows for an efficient and secure attestation by using ...
متن کاملTowards Provably-Secure Remote Memory Attestation
We initiate the study of provably secure remote memory attestation. We present two protocols offering various efficiency and security trade-offs that detect the presence of injected malicious code in remotelystored heap memory. While our solutions offer protection only against a specific class of attacks, our novel formal security definitions are general enough to cover a wide range of attacks ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1707.09043 شماره
صفحات -
تاریخ انتشار 2017