skip to main content
10.1145/1456455.1456457acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Improving the scalability of platform attestation

Published: 31 October 2008 Publication History

Abstract

In the process of platform attestation, a Trusted Platform Module is a performance bottleneck, which causes enormous delays if multiple simultaneously attestation requests arrive in a short period of time. In this paper we show how the scalability of platform attestation can be improved. In this context, we propose three protocols that enable fast and secure integrity reporting for servers that have to handle many attestation requests. We implemented all of our protocols and compared them in terms of security and performance. Our proposed protocols enable a highly frequented entity to timely answer incoming attestation requests.

References

[1]
AVISPA. Deliverable 2.3: The high-level protocol specification language. Technical report, http://www.avispa-project.org/delivs/2.1/d2-1.pdf, 2003.
[2]
S. Berger, R. Cáceres, K. A. Goldman, R. Perez, R. Sailer, and L. van Doorn. vtpm: virtualizing the trusted platform module. In USENIX-SS'06: Proceedings of the 15th conference on USENIX Security Symposium, pages 21--21, Berkeley, CA, USA, 2006. USENIX Association.
[3]
L. Chen, R. Landfermann, H. Löhr, M. Rohe, A.-R. Sadeghi, C. Stüble, and H. Görtz. A protocol for property-based attestation. In STC '06: Proceedings of the first ACM workshop on Scalable trusted computing, pages 7--16, New York, NY, USA, 2006. ACM Press.
[4]
Y. Chevalier, L. Compagna, J. Cuellar, P. H. Drieslma, J. Mantovani, S. Mödersheim, and L. Vigneron. A high level protocol specification language for industrial security-sensitive protocols. In Proceedings of Workshop on Specification and Automated Processing of Security Requirements (SAPS 2004), 2004.
[5]
T. Dierks and E. Rescorla. The Transport Layer Security (TLS) Protocol Version 1.1. Technical report, IETF Network Working Group, 2006.
[6]
D. Dolev and A. Yao. On the security of public key protocols. In Proceedings of the IEEE 22nd Annual Symposium on Foundations of Computer Science, pages 350--357, 1981.
[7]
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: A virtual machine-based platform for trusted computing. In SOSP '03: Proceedings of the nineteenth ACM symposium on Operating Systems Principles, pages 193--206, New York, NY, USA, 2003. ACM Press.
[8]
Y. Gasmi, A.-R. Sadeghi, P. Stewin, M. Unger, and N. Asokan. Beyond secure channels. In STC '07: Proceedings of the 2007 ACM workshop on Scalable trusted computing, pages 30--40, New York, NY, USA, 2007. ACM.
[9]
K. Goldman, R. Perez, and R. Sailer. Linking remote attestation to secure tunnel endpoints. In First ACM Workshop on Scalable Trusted Computing, Fairfax, Virginia, November 2006.
[10]
V. Haldar, D. Chandra, and M. Franz. Semantic remote attestation: A virtual machine directed approach to trusted computing. In USENIX Virtual Machine Research and Technology Symposium, 2004 2004.
[11]
C. Krauß, F. Stumpf, and C. Eckert. Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques. In In Proceedings of the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS 2007), Lecture Notes in Computer Science, Cambridge, UK, July 2007. Springer-Verlag.
[12]
L. Lamport. Password authentication with insecure communication. In Commun. ACM, volume 24, pages 770--772, New York, NY, USA, 1981. ACM Press.
[13]
J. Liedtke. On Micro-Kernel Construction. In SOSP '95: Proceedings of the fifteenth ACM Symposium on Operating Systems Principles, pages 237--250, New York, NY, USA, 1995. ACM Press.
[14]
H. Löhr, H. V. Ramasamy, A.-R. Sadeghi, S. Schulz, M. Schunter, and C. Stüble. Enhancing grid security using trusted virtualization. In Second Workshop on Advances in Trusted Computing (WATC'06), Tokyo, Japan, November 2006.
[15]
A.-R. Sadeghi, M. Scheibel, C. Stüble, and M. Wolf. Play it once again, sam -- enforcing stateful licenses on open platforms. In 2nd Workshop on Advances in Trusted Computing (WATC '06 Fall), Tokyo, Japan, November 2006.
[16]
A.-R. Sadeghi, M. Selhorst, C. Stüble, and M. Winandy. TCG Inside? A Note on TPM Specification Compliance. In Proceedings of the First ACM Workshop on Scalable Trusted Computing (STC'06)., 2006.
[17]
A.-R. Sadeghi and C. Stüble. Property-based attestation for computing platforms: caring about properties, not mechanisms. In NSPW '04: Proceedings of the 2004 workshop on New security paradigms, pages 67--77, New York, NY, USA, 2004. ACM Press.
[18]
R. Sailer, T. Jaeger, X. Zhang, and L. van Doorn. Attestation-based policy enforcement for remote access. In CCS '04: Proceedings of the 11th ACM conference on Computer and communications security, pages 308--317, New York, NY, USA, 2004. ACM Press.
[19]
E. Shi, A. Perrig, and L. V. Doorn. BIND: A Fine-Grained Attestation Service for Secure Distributed Systems. In SP '05: Proceedings of the 2005 IEEE Symposium on Security and Privacy, pages 154--168, Washington, DC, USA, 2005. IEEE Computer Society.
[20]
F. Stumpf, M. Benz, M. Hermanowski, and C. Eckert. An Approach to a Trustworthy System Architecture using Virtualization. In Proceedings of the 4th International Conference on Autonomic and Trusted Computing (ATC-2007), volume 4158 of Lecture Notes in Computer Science, Hong Kong, China, 2007. Springer-Verlag.
[21]
F. Stumpf and C. Eckert. Enhancing Trusted Platform Modules with Hardware-Based Virtualization Techniques. In Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2008), Cap Esterel, France, August 25--31, 2008. IEEE Computer Society.
[22]
F. Stumpf, O. Tafreschi, P. Röder, and C. Eckert. A Robust Integrity Reporting Protocol for Remote Attestation. In Second Workshop on Advances in Trusted Computing (WATC'06 Fall), Tokyo, Japan, November 2006.
[23]
Trusted Computing Group. TCG TPM Specification Version 1.2 Revision 103, Structure of the TPM. Technical report, TCG, 2007.
[24]
Trusted Computing Group. Infrastructure Subject Key Attestation Evidence Extension Version 1.0, Revision 5. Technical report, TCG, 2005.
[25]
Trusted Computing Group. TCG TPM Specification, Architecture Overview. Technical report, TCG, 2007.
[26]
Trusted Computing Group. Trusted Platform Module (TPM) specifications. Technical report, TCG, 2008, https://www.trustedcomputinggroup.org/specs/TPM
[27]
L. Viganò. Automated Security Protocol Analysis with the AVISPA Tool. In Proceedings of the XXI Mathematical Foundations of Programming Semantics (MFPS'05), volume 155 of ENTCS, Elsevier, 2005.

Cited By

View all
  • (2024)Efficient Auditing of Event-driven Web ApplicationsProceedings of the Nineteenth European Conference on Computer Systems10.1145/3627703.3650089(1208-1224)Online publication date: 22-Apr-2024
  • (2024)IPOD2: an irrecoverable and verifiable deletion scheme for outsourced dataThe Computer Journal10.1093/comjnl/bxae05367:10(2877-2889)Online publication date: 30-Jun-2024
  • (2018)TProv: Towards a Trusted Provenance-Aware Service Based on Trusted ComputingWeb Services – ICWS 201810.1007/978-3-319-94289-6_5(67-83)Online publication date: 19-Jun-2018
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
STC '08: Proceedings of the 3rd ACM workshop on Scalable trusted computing
October 2008
100 pages
ISBN:9781605582955
DOI:10.1145/1456455
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 31 October 2008

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. attestation protocols
  2. integrity reporting
  3. performance
  4. remote attestation
  5. scalability
  6. trusted computing

Qualifiers

  • Research-article

Conference

CCS08
Sponsor:

Acceptance Rates

Overall Acceptance Rate 17 of 31 submissions, 55%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)9
  • Downloads (Last 6 weeks)1
Reflects downloads up to 28 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Efficient Auditing of Event-driven Web ApplicationsProceedings of the Nineteenth European Conference on Computer Systems10.1145/3627703.3650089(1208-1224)Online publication date: 22-Apr-2024
  • (2024)IPOD2: an irrecoverable and verifiable deletion scheme for outsourced dataThe Computer Journal10.1093/comjnl/bxae05367:10(2877-2889)Online publication date: 30-Jun-2024
  • (2018)TProv: Towards a Trusted Provenance-Aware Service Based on Trusted ComputingWeb Services – ICWS 201810.1007/978-3-319-94289-6_5(67-83)Online publication date: 19-Jun-2018
  • (2017)Design and Analysis of a Modified Remote Attestation Protocol2017 IEEE Trustcom/BigDataSE/ICESS10.1109/Trustcom/BigDataSE/ICESS.2017.287(578-585)Online publication date: Aug-2017
  • (2017)RepCloud: Attesting to Cloud Service DependencyIEEE Transactions on Services Computing10.1109/TSC.2016.255851310:5(675-688)Online publication date: 1-Sep-2017
  • (2016)Trust Establishment in Cooperating Cyber-Physical SystemsSecurity of Industrial Control Systems and Cyber Physical Systems10.1007/978-3-319-40385-4_3(31-47)Online publication date: 18-Jun-2016
  • (2015)On reporting of the time of attestation measurementsMILCOM 2015 - 2015 IEEE Military Communications Conference10.1109/MILCOM.2015.7357468(354-359)Online publication date: Oct-2015
  • (2014)Design and implementation of an efficient framework for behaviour attestation using n-call slidesProceedings of the 8th International Conference on Ubiquitous Information Management and Communication10.1145/2557977.2558002(1-8)Online publication date: 9-Jan-2014
  • (2014)Trusted neighborhood discovery in critical infrastructures2014 IEEE International Conference on Smart Grid Communications (SmartGridComm)10.1109/SmartGridComm.2014.7007775(976-981)Online publication date: Nov-2014
  • (2014)NeuronVisorRevised Selected Papers of the 6th International Conference on Trusted Systems - Volume 947310.1007/978-3-319-27998-5_12(184-200)Online publication date: 16-Dec-2014
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media