Establishing Software Root of Trust Unconditionally

被引:1
|
作者
Gligor, Virgil D. [1 ]
Woo, Maverick S. L. [1 ]
机构
[1] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
关键词
TIME;
D O I
10.14722/ndss.2019.23170
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Root-of-Trust (RoT) establishment ensures either that the state of an untrusted system contains all and only content chosen by a trusted local verifier and the system code begins execution in that state, or that the verifier discovers the existence of unaccounted for content. This ensures program booting into system states that are free of persistent malware. An adversary can no longer retain undetected control of one's local system. We establish RoT unconditionally; i.e., without secrets, trusted hardware modules and instructions, or bounds on the adversary's computational power. The specification of a system's chipset and device controllers, and an external source of true random numbers, such as a commercially available quantum RNG, is all that is needed. Our system specifications are those of a concrete Word Random Access Machine (cWRAM) model - the closest computation model to a real system with a large instruction set. We define the requirements for RoT establishment and explain their differences from past attestation protocols. Then we introduce a RoT establishment protocol based on a new computation primitive with concrete (non-asymptotic) optimal space-time bounds in adversarial evaluation on the cWRAM. The new primitive is a randomized polynomial, which has kindependent uniform coefficients in a prime order field. Its collision properties are stronger than those of a k-independent (almost) universal hash function in cWRAM evaluations, and are sufficient to prove existence of malware-free states before RoT is established. Preliminary measurements show that randomizedpolynomial performance is practical on commodity hardware even for very large k. To prove the concrete optimality of randomized polynomials, we present a result of independent complexity interest: a Hornerrule program is uniquely optimal whenever the cWRAM execution space and time are simultaneously minimized.
引用
收藏
页数:15
相关论文
共 50 条
  • [21] Trust and Justice - Establishing the Link
    Chikwanha, Annie Barbara
    POLITIKON, 2021, 48 (04) : 589 - 606
  • [22] A framework for establishing trust in the Cloud
    Abbadi, Imad M.
    Alawneh, Muntaha
    COMPUTERS & ELECTRICAL ENGINEERING, 2012, 38 (05) : 1073 - 1087
  • [23] Establishing Trust Beliefs based on a Uniform Disposition to Trust
    Saadi, Rachid
    Hasan, Omar
    Pierson, Jean Marc
    Brunie, Lionel
    SITIS 2007: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SIGNAL IMAGE TECHNOLOGIES & INTERNET BASED SYSTEMS, 2008, : 221 - +
  • [24] Establishing Trust in the Emerging Era of IoT
    Sato, Hiroyuki
    Kanai, Atsushi
    Tanimoto, Shigeaki
    Kobayashi, Toru
    PROCEEDINGS 2016 IEEE SYMPOSIUM ON SERVICE-ORIENTED SYSTEM ENGINEERING SOSE 2016, 2016, : 398 - 406
  • [25] Ritual: The Root of Trust
    Frisina, Warren G.
    DAO-A JOURNAL OF COMPARATIVE PHILOSOPHY, 2021, 20 (04): : 667 - 673
  • [26] Establishing and Evaluating Trust in a Grid Environment
    Bhanwar, Shashi
    Bawa, Seema
    2009 10TH INTERNATIONAL SYMPOSIUM ON PERVASIVE SYSTEMS, ALGORITHMS, AND NETWORKS (ISPAN 2009), 2009, : 674 - 678
  • [27] A framework for establishing trust in Cloud provenance
    Abbadi, Imad M.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2013, 12 (02) : 111 - 128
  • [28] Establishing trust in mobile cloud computing
    School of Computer Science and Technology, Xi’an University of Posts and Telecommunications, Weiguo Road, Chang’an District
    Xi���an, China
    ICIC Express Lett., 6 (1713-1718):
  • [29] Establishing and Maintaining Trust in a Mobile Device
    Carver, Kristopher
    Sritapan, Vincent
    Corbett, Cherita
    IT PROFESSIONAL, 2015, 17 (06) : 66 - 68
  • [30] A framework for establishing trust in Cloud provenance
    Imad M. Abbadi
    International Journal of Information Security, 2013, 12 : 111 - 128