Policy-Based Implicit Attestation for Microkernel-Based Virtualized Systems

被引:0
|
作者
Wagner, Steffen [1 ]
Eckert, Claudia [2 ]
机构
[1] Fraunhofer Inst AISEC, Munich, Germany
[2] Tech Univ Munich, Munich, Germany
来源
关键词
Remote attestation; Trusted platform module; Policy; Data integrity; Microkernel;
D O I
10.1007/978-3-319-45871-7_19
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present an attestation mechanism that enables a remote verifier to implicitly evaluate the trustworthiness of the prover's system through policies. Those policies are verified and enforced by a TPM 2.0, when the attestor interacts with a virtualized hardware component of the prover's system. For instance, when the verifier reads a virtualized sensor device and requests integrity-protected sensor data, such as the average temperature, a heartbeat value, or an anomaly detection score, the prover's TPM, which acts as a trust anchor, checks and enforces the policies specified by the verifier. The prover, in turn, is also able to define policies, which can limit access to certain hardware components and are also enforced by the TPM. As a result, both parties have to cooperate for a successful attestation, which implicitly creates verifiable proof of the prover's trustworthiness using mainly symmetric instead of expensive asymmetric cryptographic operations like digital signatures.
引用
收藏
页码:305 / 322
页数:18
相关论文
共 50 条
  • [31] Policy-based management of networked computing systems
    Agrawal, D
    Lee, KW
    Lobo, J
    IEEE COMMUNICATIONS MAGAZINE, 2005, 43 (10) : 69 - 75
  • [32] Policy-based adaptable service systems architecture
    Supadulchai, Paramai
    Aagesen, Finn Arve
    21ST INTERNATIONAL CONFERENCE ON ADVANCED NETWORKING AND APPLICATIONS, PROCEEDINGS, 2007, : 656 - +
  • [33] Conflicts in policy-based distributed systems management
    Lupu, EC
    Sloman, M
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1999, 25 (06) : 852 - 869
  • [34] Conflicts in policy-based distributed systems management
    Department of Computing, Imperial College, London SW7 2BZ, United Kingdom
    IEEE Trans Software Eng, 6 (852-869):
  • [35] Policy-based security management for enterprise systems
    Mukkamala, R
    Chekuri, L
    Moharrum, M
    Palley, S
    RESEARCH DIRECTIONS IN DATA AND APPLICATIONS SECURITY XVIII, 2004, 144 : 219 - 233
  • [36] Integrity Verification and Secure Loading of Remote Binaries for Microkernel-based Runtime Environments
    Weiss, Michael
    Wagner, Steffen
    Hellmann, Roland
    Wessel, Sascha
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 544 - 551
  • [37] The Jury Is In: Monolithic OS Design Is Flawed Microkernel-based Designs Improve Security
    Biggs, Simon
    Lee, Damon
    Heiser, Gernot
    9TH ASIA-PACIFIC SYSTEMS WORKSHOP 2018 (APSYS'18), 2018,
  • [38] Policy-Based Signatures
    Bellare, Mihir
    Fuchsbauer, Georg
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2014, 2014, 8383 : 520 - 537
  • [39] Policy-based networking
    Chadha, R
    Lapiotis, G
    Wright, S
    IEEE NETWORK, 2002, 16 (02): : 8 - 9
  • [40] Policy-based memoization for ILP-based concept discovery systems
    Mutlu, Alev
    Karagoz, Pinar
    JOURNAL OF INTELLIGENT INFORMATION SYSTEMS, 2016, 46 (01) : 99 - 120