Catching the Cuckoo: Verifying TPM Proximity Using a Quote Timing Side-Channel - (Short Paper)
نویسندگان
چکیده
We present a Trusted Platform Module (TPM) application protocol that detects a certain man in the middle attack where an adversary captures and replaces a legitimate computing platform with an imposter that forwards platform authentication challenges to the captive over a high speed data link. This revised Cuckoo attack allows the imposter to satisfy a user’s query of platform integrity, tricking the user into divulging sensitive information to the imposter. Our protocol uses an ordinary smart card to verify the platform boot integrity through TPM quote requests, and to verify TPM proximity by measuring TPM tickstamp times required to answer the quotes. Quotes not answered in an expected amount of time may indicate the presence of an imposter’s data link, revealing the Cuckoo attack. We describe a timing model for the Cuckoo attack, and summarize experimental results that demonstrate the feasibility of using timing to detect the Cuckoo attack over practical levels of adversary link speeds.
منابع مشابه
Cuckoo Search-Aided LMS Algorithm for channel estimation in MC-CDMA Systems
In the progress of transmission systems that uses the diversity in various domains, the execution of competent baseband receivers categorized by affordable computational load is an essential thing. This would be an imperative point in the future expansion of 4G systems in which the space, time and frequency diversity will be merged together to enhance the system throughput. Here, we develop a c...
متن کاملApplication of an Improved Neural Network Using Cuckoo Search Algorithm in Short-Term Electricity Price Forecasting under Competitive Power Markets
Accurate and effective electricity price forecasting is critical to market participants in order to make an appropriate risk management in competitive electricity markets. Market participants rely on price forecasts to decide on their bidding strategies, allocate assets and plan facility investments. However, due to its time variant behavior and non-linear and non-stationary nature, electricity...
متن کاملVerifying a Privacy CA Remote Attestation Protocol
As the hardware root-of-trust in a trusted computing environment, the Trusted Platform Module (TPM) warrants formal specification and verification. This work presents results of an effort to specify and verify an abstract TPM 1.2 model using PVS that is useful for understanding the TPM and verifying protocols that utilize it. TPM commands are specified as state transformations and sequenced to ...
متن کاملAnti-Sweep Jamming Design and Implementation Using Multi-Channel Harmonic Timing Sequence Detection for Short-Range FMCW Proximity Sensors
Currently, frequency-modulated continuous-wave (FMCW) proximity sensors are widely used. However, they suffer from a serious sweep jamming problem, which significantly reduces the ranging performance. To improve its anti-jamming capability, this paper analyzed the response mechanism of a proximity sensor with the existence of real target echo signals and sweep jamming, respectively. Then, a mul...
متن کاملBootstrapping Trust in a "Trusted" Platform
For the last few years, many commodity computers have come equipped with a Trusted Platform Module (TPM). Existing research shows that the TPM can be used to establish trust in the software executing on a computer. However, at present, there is no standard mechanism for establishing trust in the TPM on a particular machine. Indeed, any straightforward approach falls victim to a cuckoo attack. I...
متن کامل