Practical analysis framework for software-based attestation scheme
An increasing number of ”smart” embedded devices are employed in our living environment nowadays. Unlike traditional computer systems, these devices are often physically accessible to the attackers. It is therefore almost impossible to guarantee that they are un-compromised, i.e., that indeed the de...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2014
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/4986 https://ink.library.smu.edu.sg/context/sis_research/article/5989/viewcontent/practical_analysis.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-5989 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-59892020-03-12T09:44:52Z Practical analysis framework for software-based attestation scheme LI, Li HU, Hong SUN, Jun LIU, Yang DONG Jin Song, An increasing number of ”smart” embedded devices are employed in our living environment nowadays. Unlike traditional computer systems, these devices are often physically accessible to the attackers. It is therefore almost impossible to guarantee that they are un-compromised, i.e., that indeed the devices are executing the intended software. In such a context, software-based attestation is deemed as a promising solution to validate their software integrity. It guarantees that the software running on the embedded devices are un-compromised without any hardware support. However, designing software-based attestation protocols are shown to be error-prone. In this work, we develop a framework for design and analysis of software-based attestation protocols. We first propose a generic attestation scheme that captures most existing software-based attestation protocols. After formalizing the security criteria for the generic scheme, we apply our analysis framework to several well-known software-based attestation protocols and report various potential vulnerabilities. To the best of our knowledge, this is the first practical analysis framework for software-based attestation protocols. 2014-05-11T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/4986 info:doi/10.1007/978-3-319-11737-9_19 https://ink.library.smu.edu.sg/context/sis_research/article/5989/viewcontent/practical_analysis.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Memory State Data Memory Memory Address Malicious Code Embed Device Software Engineering |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Memory State Data Memory Memory Address Malicious Code Embed Device Software Engineering |
spellingShingle |
Memory State Data Memory Memory Address Malicious Code Embed Device Software Engineering LI, Li HU, Hong SUN, Jun LIU, Yang DONG Jin Song, Practical analysis framework for software-based attestation scheme |
description |
An increasing number of ”smart” embedded devices are employed in our living environment nowadays. Unlike traditional computer systems, these devices are often physically accessible to the attackers. It is therefore almost impossible to guarantee that they are un-compromised, i.e., that indeed the devices are executing the intended software. In such a context, software-based attestation is deemed as a promising solution to validate their software integrity. It guarantees that the software running on the embedded devices are un-compromised without any hardware support. However, designing software-based attestation protocols are shown to be error-prone. In this work, we develop a framework for design and analysis of software-based attestation protocols. We first propose a generic attestation scheme that captures most existing software-based attestation protocols. After formalizing the security criteria for the generic scheme, we apply our analysis framework to several well-known software-based attestation protocols and report various potential vulnerabilities. To the best of our knowledge, this is the first practical analysis framework for software-based attestation protocols. |
format |
text |
author |
LI, Li HU, Hong SUN, Jun LIU, Yang DONG Jin Song, |
author_facet |
LI, Li HU, Hong SUN, Jun LIU, Yang DONG Jin Song, |
author_sort |
LI, Li |
title |
Practical analysis framework for software-based attestation scheme |
title_short |
Practical analysis framework for software-based attestation scheme |
title_full |
Practical analysis framework for software-based attestation scheme |
title_fullStr |
Practical analysis framework for software-based attestation scheme |
title_full_unstemmed |
Practical analysis framework for software-based attestation scheme |
title_sort |
practical analysis framework for software-based attestation scheme |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2014 |
url |
https://ink.library.smu.edu.sg/sis_research/4986 https://ink.library.smu.edu.sg/context/sis_research/article/5989/viewcontent/practical_analysis.pdf |
_version_ |
1770575168270237696 |