Skip to main content
Top

2020 | OriginalPaper | Chapter

A Symbolic Model for Systematically Analyzing TEE-Based Protocols

Authors : Shiwei Xu, Yizhi Zhao, Zhengwei Ren, Lingjuan Wu, Yan Tong, Huanguo Zhang

Published in: Information and Communications Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Trusted Execution Environment (TEE) has been widely used as an approach to provide an isolated storage and computation environment for various protocols, and thus security features of TEE determine how to design these protocols. In practice, however, new TEE-based protocols are often designed empirically, and a lack of comprehensive analysis against real threat models easily results in vulnerabilities and attacks. Unlike most past work focusing on communication channels or secure enclaves, we present a formal model for TEE-based protocols, which includes a detailed threat model taking into account attacks from both network and TEE-based platforms together with a scalable multiset-rewriting modelling framework instantiated by Tamarin. Based on the proposed threat model and formalism, we use Tamarin to systematically and automatically analyze related offline and web-based protocols considering all combination of threats. The results and comparison highlight the protocols’ advantages and weaknesses inherited from TEE-based platforms. Moreover, we also capture some vulnerabilities that are difficult to be found under the traditional threat model and propose corresponding fixes.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Literature
1.
go back to reference Lebedev, I., Hogan, K., Devadas, S.: Invited paper: secure boot and remote attestation in the sanctum processor. In: Proceedings of the CSF, Oxford, UK, pp. 46–60 (2018) Lebedev, I., Hogan, K., Devadas, S.: Invited paper: secure boot and remote attestation in the sanctum processor. In: Proceedings of the CSF, Oxford, UK, pp. 46–60 (2018)
4.
go back to reference Machiry, A., Gustafson, E., Spensky, C., et al.: BOOMERANG: exploiting the semantic gap in trusted execution environments. In: Proceedings of the NDSS, San Diego, CA, USA (2017) Machiry, A., Gustafson, E., Spensky, C., et al.: BOOMERANG: exploiting the semantic gap in trusted execution environments. In: Proceedings of the NDSS, San Diego, CA, USA (2017)
5.
go back to reference Bulck, J.V., Oswald, D., Marin, E., Aldoseri, A., Garcia, F.D., Piessens, F.: A tale of two worlds: assessing the vulnerability of enclave shielding runtimes. In: Proceedings of the CSS, London, UK, pp. 1741–1758 (2019) Bulck, J.V., Oswald, D., Marin, E., Aldoseri, A., Garcia, F.D., Piessens, F.: A tale of two worlds: assessing the vulnerability of enclave shielding runtimes. In: Proceedings of the CSS, London, UK, pp. 1741–1758 (2019)
6.
go back to reference Bulck, J.V., Piessens, F., Strackx, R.: SGX-step: a practical attack framework for precise enclave execution control. In: Proceedings of the SysTEX, Shanghai, China, pp. 1–6 (2017) Bulck, J.V., Piessens, F., Strackx, R.: SGX-step: a practical attack framework for precise enclave execution control. In: Proceedings of the SysTEX, Shanghai, China, pp. 1–6 (2017)
9.
go back to reference Shao, J., Qin, Y., Feng, D., Wang, W.: Formal analysis of enhanced authorization in the TPM 2.0. In: Proceedings of the AsiaCCS, Singapore, pp. 273–284 (2015) Shao, J., Qin, Y., Feng, D., Wang, W.: Formal analysis of enhanced authorization in the TPM 2.0. In: Proceedings of the AsiaCCS, Singapore, pp. 273–284 (2015)
10.
go back to reference Sinha, R., Rajamani, S., Seshia, S., Vaswani, K.: Moat: verifying confidentiality of enclave programs. In: Proceedings of the CCS, Denver, Colorado, USA, pp. 1169–1184 (2015) Sinha, R., Rajamani, S., Seshia, S., Vaswani, K.: Moat: verifying confidentiality of enclave programs. In: Proceedings of the CCS, Denver, Colorado, USA, pp. 1169–1184 (2015)
11.
go back to reference Datta, A., Franklin, J., Garg, D., Kaynar, D.: A logic of secure systems and its application to trusted computing. In: Proceedings of the S&P, Berkeley, CA, USA, pp. 221–236 (2009) Datta, A., Franklin, J., Garg, D., Kaynar, D.: A logic of secure systems and its application to trusted computing. In: Proceedings of the S&P, Berkeley, CA, USA, pp. 221–236 (2009)
12.
go back to reference Jia, L., Sen, S., Garg, D., Datta, A.: A logic of programs with interface-confined code. In: Proceedings of the CSF, Verona, Italy, pp. 512–525 (2015) Jia, L., Sen, S., Garg, D., Datta, A.: A logic of programs with interface-confined code. In: Proceedings of the CSF, Verona, Italy, pp. 512–525 (2015)
13.
go back to reference Jacomme, C., Kremer, S., Scerri, G.: Symbolic models for isolated execution environments. In: Proceedings of the EuroS&P, Paris, France, pp. 127–141 (2017) Jacomme, C., Kremer, S., Scerri, G.: Symbolic models for isolated execution environments. In: Proceedings of the EuroS&P, Paris, France, pp. 127–141 (2017)
19.
go back to reference Lowe, G.: A hierarchy of authentication specification. In: Proceedings of the CSFW, Rockport, Massachusetts, USA, pp. 31–44 (1997) Lowe, G.: A hierarchy of authentication specification. In: Proceedings of the CSFW, Rockport, Massachusetts, USA, pp. 31–44 (1997)
22.
go back to reference Chen, L., Li, J.: Flexible and scalable digital signatures in TPM 2.0. In: Proceedings of the NDSS, Berlin, Germany, pp. 37–48 (2013) Chen, L., Li, J.: Flexible and scalable digital signatures in TPM 2.0. In: Proceedings of the NDSS, Berlin, Germany, pp. 37–48 (2013)
Metadata
Title
A Symbolic Model for Systematically Analyzing TEE-Based Protocols
Authors
Shiwei Xu
Yizhi Zhao
Zhengwei Ren
Lingjuan Wu
Yan Tong
Huanguo Zhang
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-61078-4_8

Premium Partner