BLINDTRUST: Oblivious Remote Attestation for Secure Service Function Chains

07/11/2021
by   Heini Bergsson Debes, et al.
0

With the rapidly evolving next-generation systems-of-systems, we face new security, resilience, and operational assurance challenges. In the face of the increasing attack landscape, it is necessary to cater to efficient mechanisms to verify software and device integrity to detect run-time modifications. Towards this direction, remote attestation is a promising defense mechanism that allows a third party, the verifier, to ensure a remote device's (the prover's) integrity. However, many of the existing families of attestation solutions have strong assumptions on the verifying entity's trustworthiness, thus not allowing for privacy preserving integrity correctness. Furthermore, they suffer from scalability and efficiency issues. This paper presents a lightweight dynamic configuration integrity verification that enables inter and intra-device attestation without disclosing any configuration information and can be applied on both resource-constrained edge devices and cloud services. Our goal is to enhance run-time software integrity and trustworthiness with a scalable solution eliminating the need for federated infrastructure trust.

READ FULL TEXT
research
09/19/2023

Poster: Control-Flow Integrity in Low-end Embedded Devices

Embedded, smart, and IoT devices are increasingly popular in numerous ev...
research
01/16/2021

SEDAT:Security Enhanced Device Attestation with TPM2.0

Remote attestation is one of the ways to verify the state of an untruste...
research
05/06/2021

Remote Attestation: A Literature Review

With the rising number of IoT devices, the security of such devices beco...
research
07/26/2018

RADIS: Remote Attestation of Distributed IoT Services

Remote attestation is a security technique by which a potentially untrus...
research
11/18/2018

WISE: Lightweight Intelligent Swarm Attestation Scheme for IoT (The Verifier's Perspective)

The growing pervasiveness of Internet of Things (IoT) expands the attack...
research
07/07/2018

VPKIaaS: A Highly-Available and Dynamically-Scalable Vehicular Public-Key Infrastructure

The central building block of secure and privacy-preserving Vehicular Co...
research
02/22/2022

Authenticated time for detecting GNSS attacks

Information cross-validation can be a powerful tool to detect manipulate...

Please sign up or login with your details

Forgot password? Click here to reset