Policy-based implicit attestation for microkernel-based virtualized systems
We present an attestation mechanism that enables a remote verifier to implicitly evaluate the trustworthiness of the prover’s system through policies. Those policies are verified and enforced by a TPM 2.0, when the attestor interacts with a virtualized hardware component of the prover’s system. For instance, when the verifier reads a virtualized sensor device and requests integrity-protected sensor data, such as the average temperature, a heartbeat value, or an anomaly detection score, the prover’s TPM, which acts as a trust anchor, checks and enforces the policies specified by the verifier. The prover, in turn, is also able to define policies, which can limit access to certain hardware components and are also enforced by the TPM. As a result, both parties have to cooperate for a successful attestation, which implicitly creates verifiable proof of the prover’s trustworthiness using mainly symmetric instead of expensive asymmetric cryptographic operations like digital signatures.
Policy-based implicit attestation for microkernel-based virtualized systems
Information security. 19th international conference, ISC 2016
Authors: | Steffen Wagner and Claudia Eckert |
Year/month: | 2016/9 |
Booktitle: | Information security. 19th international conference, ISC 2016 |
Pages: | 305-322 |
Address: | Honolulu, HI, USA |
Fulltext: | click here |
Abstract |
|
We present an attestation mechanism that enables a remote verifier to implicitly evaluate the trustworthiness of the prover’s system through policies. Those policies are verified and enforced by a TPM 2.0, when the attestor interacts with a virtualized hardware component of the prover’s system. For instance, when the verifier reads a virtualized sensor device and requests integrity-protected sensor data, such as the average temperature, a heartbeat value, or an anomaly detection score, the prover’s TPM, which acts as a trust anchor, checks and enforces the policies specified by the verifier. The prover, in turn, is also able to define policies, which can limit access to certain hardware components and are also enforced by the TPM. As a result, both parties have to cooperate for a successful attestation, which implicitly creates verifiable proof of the prover’s trustworthiness using mainly symmetric instead of expensive asymmetric cryptographic operations like digital signatures. |
Bibtex:
@inproceedings { Wagner2016,author = { Steffen Wagner and Claudia Eckert},
title = { Policy-based implicit attestation for microkernel-based virtualized systems },
year = { 2016 },
month = { September },
booktitle = { Information security. 19th international conference, ISC 2016 },
address = { Honolulu, HI, USA },
pages = { 305-322 },
url = { http://dx.doi.org/10.1007/978-3-319-45871-7_19 },
}