Skip to main content

2016 | OriginalPaper | Buchkapitel

Advanced Remote Firmware Upgrades Using TPM 2.0

verfasst von : Andreas Fuchs, Christoph Krauß, Jürgen Repp

Erschienen in: ICT Systems Security and Privacy Protection

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A central aspect for securing connected embedded systems are remote firmware upgrades to deal with vulnerabilities discovered after deployment. In many scenarios, Hardware Security Modules such as the Trusted Computing Group’s Trusted Platform Module (TPM) 2.0 are used as a security-anchor in embedded systems. In this paper, we discuss the benefits of TPM 2.0 for securing embedded systems and present a concept for advanced remote firmware upgrade of an embedded system with enforcement of Intellectual Property Rights and Privacy protection of device-resident data (i.e., data that remains on the device during the flashing process). This concept utilizes unique features of TPM 2.0. Furthermore, a prototypical implementation using a hardware TPM 2.0 and the TPM Software Stack 2.0 low-level System API is presented as a proof-of-concept.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
3.
Zurück zum Zitat Apple: iOS Security. Technical report Apple, p. 5 (2015) Apple: iOS Security. Technical report Apple, p. 5 (2015)
4.
Zurück zum Zitat ARM Security Technology: Security technology - building a secure system using trustzone technology (2009) ARM Security Technology: Security technology - building a secure system using trustzone technology (2009)
5.
Zurück zum Zitat Challener, D., Arthur, W.: A Practical Guide to TpPM 2.0: Using the Trusted Platform Module in the New Age of Security. Apress, New York (2015) Challener, D., Arthur, W.: A Practical Guide to TpPM 2.0: Using the Trusted Platform Module in the New Age of Security. Apress, New York (2015)
8.
Zurück zum Zitat Greenberg, A., Miller, C., Valasek, C.: Hackers Remotely Kill a Jeep on the Highway - With Me in It. Wired, San Francisco (2015) Greenberg, A., Miller, C., Valasek, C.: Hackers Remotely Kill a Jeep on the Highway - With Me in It. Wired, San Francisco (2015)
9.
Zurück zum Zitat Henniger, O., Apvrille, L., Fuchs, A., Roudier, Y., Ruddle, A., Weyl, B.: Security requirements for automotive on-board networks. In: 9th International Conference on Intelligent Transport Systems Telecommunications (ITST 2009). IEEE (2009) Henniger, O., Apvrille, L., Fuchs, A., Roudier, Y., Ruddle, A., Weyl, B.: Security requirements for automotive on-board networks. In: 9th International Conference on Intelligent Transport Systems Telecommunications (ITST 2009). IEEE (2009)
10.
Zurück zum Zitat Hersteller Initiative Software (HIS) AK Security: SHE-Secure Hardware Extension, version 1.1st edn (2009) Hersteller Initiative Software (HIS) AK Security: SHE-Secure Hardware Extension, version 1.1st edn (2009)
11.
12.
Zurück zum Zitat Intel: Software guard extensions programming reference (2014) Intel: Software guard extensions programming reference (2014)
16.
Zurück zum Zitat Miller, C., Valasek, C.: A Survey of Remote Automotive Attack Surfaces. Blackhat, Las Vegas (2014) Miller, C., Valasek, C.: A Survey of Remote Automotive Attack Surfaces. Blackhat, Las Vegas (2014)
17.
Zurück zum Zitat Trusted Computing Group: TPM Main Specification, Level 2 Version 1.2, Revision 116th edn, March 2011 Trusted Computing Group: TPM Main Specification, Level 2 Version 1.2, Revision 116th edn, March 2011
18.
Zurück zum Zitat Trusted Computing Group: Trusted Platform Module Library Specification, Family 2.0, Level 00, Revision 01.16th edn, October 2014 Trusted Computing Group: Trusted Platform Module Library Specification, Family 2.0, Level 00, Revision 01.16th edn, October 2014
19.
Zurück zum Zitat Trusted Computing Group: TSS Feature API Specification, Family 2.0, Level 00, Revision 00.12nd edn, November 2014 Trusted Computing Group: TSS Feature API Specification, Family 2.0, Level 00, Revision 00.12nd edn, November 2014
20.
Zurück zum Zitat Trusted Computing Group: Algorithm Registry, revision 01.22nd edn (2015) Trusted Computing Group: Algorithm Registry, revision 01.22nd edn (2015)
21.
Zurück zum Zitat Trusted Computing Group: PC Client Platform TPM Profile (PTP) Specification, Family 2.0, Revision 00.43rd edn, January 2015 Trusted Computing Group: PC Client Platform TPM Profile (PTP) Specification, Family 2.0, Revision 00.43rd edn, January 2015
22.
Zurück zum Zitat Trusted Computing Group: TCG TpPM 2.0 Library Profile for Automotive-Thin, version 1.0edn, March 2015 Trusted Computing Group: TCG TpPM 2.0 Library Profile for Automotive-Thin, version 1.0edn, March 2015
23.
Zurück zum Zitat Trusted Computing Group: Trusted Computing Group TpPM 2.0 Library Specification Approved as an ISO/IEC International Standard, June 2015 Trusted Computing Group: Trusted Computing Group TpPM 2.0 Library Specification Approved as an ISO/IEC International Standard, June 2015
24.
Zurück zum Zitat Trusted Computing Group: TSS System Level API and TPM Command Transmission Interface Specification, Family 2.0, Revision 01.00edn, January 2015 Trusted Computing Group: TSS System Level API and TPM Command Transmission Interface Specification, Family 2.0, Revision 01.00edn, January 2015
25.
Zurück zum Zitat Weyl, B., Wolf, M., Zweers, F., Gendrullis, T., Idrees, M.S., Roudier, Y., Schweppe, H., Platzdasch, H., El Khayari, R., Henniger, O., et al.: Secure on-board architecture specification. Evita Deliverable D3.2 3, 2 (2010) Weyl, B., Wolf, M., Zweers, F., Gendrullis, T., Idrees, M.S., Roudier, Y., Schweppe, H., Platzdasch, H., El Khayari, R., Henniger, O., et al.: Secure on-board architecture specification. Evita Deliverable D3.2 3, 2 (2010)
26.
Zurück zum Zitat Wilkins, R., Richardson, B.: UEFI Secure Boot in Modern Computer Security Solutions. Technical report, UEFI Forum (2013) Wilkins, R., Richardson, B.: UEFI Secure Boot in Modern Computer Security Solutions. Technical report, UEFI Forum (2013)
Metadaten
Titel
Advanced Remote Firmware Upgrades Using TPM 2.0
verfasst von
Andreas Fuchs
Christoph Krauß
Jürgen Repp
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-33630-5_19