Remote Attestation of Software and Execution-Environment in Modern Machines

被引:6
|
作者
Kiperberg, Michael [1 ]
Resh, Amit [1 ]
Zaidenberg, Nezer J. [1 ]
机构
[1] Univ Jyvaskyla, Deparment Math IT, SF-40351 Jyvaskyla, Finland
关键词
D O I
10.1109/CSCloud.2015.52
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The research on network security concentrates mainly on securing the communication channels between two endpoints, which is insufficient if the authenticity of one of the endpoints cannot be determined with certainty. Previously [1], [2] presented methods that allow one endpoint, the authentication authority, to authenticate another remote machine. These methods are inadequate for modern machines that have multiple processors, introduce virtualization extensions, have a greater variety of side effects, and suffer from nondeterminism. This paper addresses the advances of modern machines with respect to the method presented in [1]. The authors describe how a remote attestation procedure, involving a challenge, needs to be structured in order to provide correct attestation of a remote modern target system.
引用
收藏
页码:335 / 341
页数:7
相关论文
共 50 条
  • [21] Counteracting software integrity attacks on IoT devices with remote attestation: a prototype
    Berbecaru, Diana Gratiela
    Sisinni, Silvia
    [J]. 2022 26TH INTERNATIONAL CONFERENCE ON SYSTEM THEORY, CONTROL AND COMPUTING (ICSTCC), 2022, : 380 - 385
  • [22] Software-Based Remote Attestation for Safety-Critical Systems
    Preschern, Christopher
    Hoermer, Andreas Johann
    Kajtazovic, Nermin
    Kreiner, Christian
    [J]. IEEE SIXTH INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS (ICSTW 2013), 2013, : 8 - 12
  • [23] A Software-Based Remote Attestation Scheme for Internet of Things Devices
    Cao, Jin
    Zhu, Tong
    Ma, Ruhui
    Guo, Zhenyang
    Zhang, Yinghui
    Li, Hui
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (02) : 1422 - 1434
  • [24] Software-based remote memory attestation using quantum entanglement
    Laeuchli, Jesse
    Trujillo-Rasua, Rolando
    [J]. QUANTUM INFORMATION PROCESSING, 2024, 23 (06)
  • [25] Bypassing software-based remote attestation using debug registers
    Zhang, Zheng
    Xue, Jingfeng
    Mu, Tianshi
    Yu, Ting
    Qiu, Kefan
    Chen, Tian
    Li, Yuanzhang
    [J]. CONNECTION SCIENCE, 2024, 36 (01)
  • [26] CryptoNET: Software Protection and Secure Execution Environment
    Ghafoor, Abdul
    Muftic, Sead
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (02): : 19 - 26
  • [27] INTERBASE - AN EXECUTION ENVIRONMENT FOR HETEROGENEOUS SOFTWARE SYSTEMS
    BUKHRES, OA
    CHEN, JS
    DU, WM
    ELMAGARMID, AK
    PEZZOLI, R
    [J]. COMPUTER, 1993, 26 (08) : 57 - 69
  • [28] REXEC: A decentralized, secure remote execution environment for clusters
    Chun, BN
    Culler, DE
    [J]. NETWORK-BASED PARALLEL COMPUTING, PROCEEDINGS: COMMUNICATION, ARCHITECTURE, AND APPLICATIONS, 2000, 1797 : 1 - 14
  • [29] MeetGo: A Trusted Execution Environment for Remote Applications on FPGA
    Oh, Hyunyoung
    Nam, Kevin
    Jeon, Seongil
    Cho, Yeongpil
    Paek, Yunheung
    [J]. IEEE ACCESS, 2021, 9 : 51313 - 51324
  • [30] Efficient Remote Software Execution Architecture based on Dynamic Address Translation for Internet-of-Things Software Execution Platform
    Jung, Minwoo
    Park, Daejin
    Cho, Jeonghun
    [J]. PROCEEDINGS 2015 18TH INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS (NBIS 2015), 2015, : 371 - 378