Benchmarking the Security Protocol and Data Model (SPDM) for component authentication

07/12/2023
by   Renan C. A. Alves, et al.
0

Efforts to secure computing systems via software traditionally focus on the operating system and application levels. In contrast, the Security Protocol and Data Model (SPDM) tackles firmware level security challenges, which are much harder (if at all possible) to detect with regular protection software. SPDM includes key features like enabling peripheral authentication, authenticated hardware measurements retrieval, and secure session establishment. Since SPDM is a relatively recent proposal, there is a lack of studies evaluating its performance impact on real-world applications. In this article, we address this gap by: (1) implementing the protocol on a simple virtual device, and then investigating the overhead introduced by each SDPM message; and (2) creating an SPDM-capable virtual hard drive based on VirtIO, and comparing the resulting read/write performance with a regular, unsecured implementation. Our results suggest that SPDM bootstrap time takes the order of tens of milliseconds, while the toll of introducing SPDM on hard drive communication highly depends on specific workload patterns. For example, for mixed random read/write operations, the slowdown is negligible in comparison to the baseline unsecured setup. Conversely, for sequential read or write operations, the data encryption process becomes the bottleneck, reducing the performance indicators by several orders of magnitude.

READ FULL TEXT

page 8

page 10

research
08/09/2021

Technical Report on a Virtual CTAP2 WebAuthn Authenticator

Even though passwordless authentication to online accounts offers greate...
research
02/04/2020

Encryption Algorithm for TCP Session Hijacking

Distributed network of the computer and the design defects of the TCP pr...
research
09/23/2019

LEAP: A Lightweight Encryption and Authentication Protocol for In-Vehicle Communications

The Controller Area Network (CAN) is considered as the de-facto standard...
research
08/04/2022

Identity-Based Authentication for On-Demand Charging of Electric Vehicles

Dynamic wireless power transfer provides means for charging Electric Veh...
research
08/29/2020

A Formal Security Analysis of the pEp Authentication Protocol for Decentralized Key Distribution and End-to-End Encrypted Email

To send encrypted emails, users typically need to create and exchange ke...
research
06/11/2021

Bandwidth-Optimal Random Shuffling for GPUs

Linear-time algorithms that are traditionally used to shuffle data on CP...
research
06/09/2023

CAWL: A Cache-aware Write Performance Model of Linux Systems

The performance of data intensive applications is often dominated by the...

Please sign up or login with your details

Forgot password? Click here to reset