SEDAT:Security Enhanced Device Attestation with TPM2.0

01/16/2021
by   Avani Dave, et al.
0

Remote attestation is one of the ways to verify the state of an untrusted device. Earlier research has attempted remote verification of a devices' state using hardware, software, or hybrid approaches. Majority of them have used Attestation Key as a hardware root of trust, which does not detect hardware modification or counterfeit issues. In addition, they do not have a secure communication channel between verifier and prover, which makes them susceptible to modern security attacks. This paper presents SEDAT, a novel methodology for remote attestation of the device via a security enhanced communication channel. SEDAT performs hardware, firmware, and software attestation. SEDAT enhances the communication protocol security between verifier and prover by using the Single Packet Authorization (SPA) technique, which provides replay and Denial of Service (DoS) protection. SEDAT provides a way for verifier to get on-demand device integrity and authenticity status via a secure channel. It also enables the verifier to detect counterfeit hardware, change in firmware, and software code on the device. SEDAT validates the manufacturers` root CA certificate, platform certificate, endorsement certificate (EK), and attributes certificates to perform platform hardware attestation. SEDAT is the first known tool that represents firmware, and Integrity Measurement Authority (IMA) event logs in the Canonical Event Logs (CEL) format (recommended by Trusted Computing Group). SEDAT is the first implementation, to the best of our knowledge, that showcases end to end hardware, firmware, and software remote attestation using Trusted Platform Module (TPM2.0) which is resilient to DoS and replay attacks. SEDAT is the first remote verifier that is capable of retrieving a TPM2.0 quote from prover and validate it after regeneration, using a software TPM2.0 quote check.

READ FULL TEXT

page 1

page 3

page 4

page 5

page 7

research
05/06/2021

Remote Attestation: A Literature Review

With the rising number of IoT devices, the security of such devices beco...
research
05/11/2019

Artificial Consciousness and Security

This paper describes a possible way to improve computer security by impl...
research
07/11/2021

BLINDTRUST: Oblivious Remote Attestation for Secure Service Function Chains

With the rapidly evolving next-generation systems-of-systems, we face ne...
research
09/02/2022

CASU: Compromise Avoidance via Secure Update for Low-end Embedded Systems

Guaranteeing runtime integrity of embedded system software is an open pr...
research
04/27/2018

Secure Remote Credential Management with Mutual Attestation for Constrained Sensing Platforms with TEEs

Trusted Execution Environments (TEEs) are rapidly emerging as the go-to ...
research
04/04/2020

Building secure distributed applications the DECENT way

Remote attestation (RA) enables distributed applications that deploy tru...
research
05/14/2019

LASER: Lightweight And SEcure Remote keyless entry protocol (Extended version)

Since Remote Keyless Entry (RKE) systems started to be widely used, seve...

Please sign up or login with your details

Forgot password? Click here to reset