SimHAT: Simulated Hardware-based Attestation evaluation Tool

نویسندگان

  • Kirti Chawla
  • Taniya Siddiqua
چکیده

Embedded devices have come to play an important role in our daily lives. Increasingly, diverse fields like healthcare systems, banks and more are using these devices to automate underlying complex tasks. This reliance has led to a significant development – exposure of devices to malicious attacks, including control and subversion of software onboard. Software attestation has been herald as a solution to minimize the effects of malicious attacks on the devices. With low power, relatively small memory size and less processor frequency, standard software attestation techniques cannot be directly applied to embedded devices. To solve this problem, we propose a novel design of simulated hardware-based tool. Our tool can be used to evaluate competing attestation techniques. Furthermore, We present a reference implementation and evaluate the runtime cost of a home-grown attestation procedure.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Dynamic Policy Discovery with Remote Attestation

Remote attestation allows programs running on trusted hardware to prove their identity (and that of their environment) to programs on other hosts. Remote attestation can be used to address security concerns if programs agree on the meaning of data in attestations. This paper studies the enforcement of codeidentity based access control policies in a hostile distributed environment, using a combi...

متن کامل

Lightweight Remote Attestation using Physical Functions

Remote attestation is a mechanism to securely and verifiably obtain information about the state of a remote computing platform. However, resource-constrained embedded devices cannot afford the required trusted hardware components, while software attestation is generally vulnerable to network and collusion attacks. In this paper, we present a lightweight remote attestation scheme that links soft...

متن کامل

Conqueror: Tamper-Proof Code Execution on Legacy Systems

We present Conqueror, a software-based attestation scheme for tamper-proof code execution on untrusted legacy systems. Beside providing load-time attestation of a piece of code, Conqueror also ensures run-time integrity. Conqueror constitutes a valid alternative to trusted computing platforms, for systems lacking specialized hardware for attestation. We implemented a prototype, specific for the...

متن کامل

Poster Abstract: A Hardware-based Remote Attestation Protocol in Wireless Sensor Networks

Given the limited resources and computational power of current embedded sensor devices memory protection is difficult to achieve and generally unavailable. Hence, the buffer overflow that is used by the worm attacks in the Internet can be easily exploited to inject malicious code into Wireless Sensor Networks (WSNs). We designed a hardware-based remote attestation protocol to counter the buffer...

متن کامل

Security Evaluation of Scenarios Based on the TCG's TPM Specification

The Trusted Platform Module TPM is a basic but nevertheless very complex security component that can provide the foundations and the root of security for a variety of applications. In contrast to the TPM, other basic security mechanisms like cryptographic algorithms or security protocols have frequently been subject to thorough security analysis and formal verification. This paper presents a fi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007