SimHAT: Simulated Hardware-based Attestation evaluation Tool
نویسندگان
چکیده
Embedded devices have come to play an important role in our daily lives. Increasingly, diverse fields like healthcare systems, banks and more are using these devices to automate underlying complex tasks. This reliance has led to a significant development – exposure of devices to malicious attacks, including control and subversion of software onboard. Software attestation has been herald as a solution to minimize the effects of malicious attacks on the devices. With low power, relatively small memory size and less processor frequency, standard software attestation techniques cannot be directly applied to embedded devices. To solve this problem, we propose a novel design of simulated hardware-based tool. Our tool can be used to evaluate competing attestation techniques. Furthermore, We present a reference implementation and evaluate the runtime cost of a home-grown attestation procedure.
منابع مشابه
Dynamic Policy Discovery with Remote Attestation
Remote attestation allows programs running on trusted hardware to prove their identity (and that of their environment) to programs on other hosts. Remote attestation can be used to address security concerns if programs agree on the meaning of data in attestations. This paper studies the enforcement of codeidentity based access control policies in a hostile distributed environment, using a combi...
متن کاملLightweight Remote Attestation using Physical Functions
Remote attestation is a mechanism to securely and verifiably obtain information about the state of a remote computing platform. However, resource-constrained embedded devices cannot afford the required trusted hardware components, while software attestation is generally vulnerable to network and collusion attacks. In this paper, we present a lightweight remote attestation scheme that links soft...
متن کاملConqueror: Tamper-Proof Code Execution on Legacy Systems
We present Conqueror, a software-based attestation scheme for tamper-proof code execution on untrusted legacy systems. Beside providing load-time attestation of a piece of code, Conqueror also ensures run-time integrity. Conqueror constitutes a valid alternative to trusted computing platforms, for systems lacking specialized hardware for attestation. We implemented a prototype, specific for the...
متن کاملPoster Abstract: A Hardware-based Remote Attestation Protocol in Wireless Sensor Networks
Given the limited resources and computational power of current embedded sensor devices memory protection is difficult to achieve and generally unavailable. Hence, the buffer overflow that is used by the worm attacks in the Internet can be easily exploited to inject malicious code into Wireless Sensor Networks (WSNs). We designed a hardware-based remote attestation protocol to counter the buffer...
متن کاملSecurity Evaluation of Scenarios Based on the TCG's TPM Specification
The Trusted Platform Module TPM is a basic but nevertheless very complex security component that can provide the foundations and the root of security for a variety of applications. In contrast to the TPM, other basic security mechanisms like cryptographic algorithms or security protocols have frequently been subject to thorough security analysis and formal verification. This paper presents a fi...
متن کامل