Towards a Backdoorless Network Architecture Based on Remote Attestation and Backdoor Inspection

07/29/2020
by   Takayuki Sasaki, et al.
0

To keep a system secure, all devices in the system need to be benign. To avoid malicious and/or compromised devices, network access control such as authentication using a credential and remote attestation based on trusted hardware has been used. These techniques ensure the authenticity and integrity of the devices, but do not mitigate risks of a backdoor embedded in the devices by the developer. To tackle this problem, we propose a novel architecture that integrates remote attestation and backdoor inspection. Specifically, the backdoor inspection result is stored in a server and the verifier retrieves and checks the backdoor inspection result when the remote attestation is performed. Moreover, we discuss issues to deploy the proposed architecture to the real world.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/03/2020

Evaluation of a Skill-based Control Architecture for a Visual Inspection-oriented Aerial Platform

The periodic inspection of vessels is a fundamental task to ensure their...
research
07/22/2023

Intelligent Remote Sensing Image Quality Inspection System

Quality inspection is a necessary task before putting any remote sensing...
research
06/05/2019

An Overview of GSMA's M2M Remote Provisioning Specification

M2M devices are ubiquitous, and there is a growing tendency to connect s...
research
09/02/2022

CASU: Compromise Avoidance via Secure Update for Low-end Embedded Systems

Guaranteeing runtime integrity of embedded system software is an open pr...
research
05/30/2019

DOMtegrity: Ensuring Web Page Integrity against Malicious Browser Extensions

In this paper, we address an unsolved problem in the real world: how to ...
research
07/29/2020

Security Architecture for Trustworthy Systems in 5G Era

Systems using 5G are expected to be used in various cases of Society 5.0...
research
01/27/2022

A TOCTOU Attack on DICE Attestation

A major security challenge for modern Internet of Things (IoT) deploymen...

Please sign up or login with your details

Forgot password? Click here to reset