Skip to main content

2016 | OriginalPaper | Buchkapitel

Re-visited: On the Value of Purely Software-Based Code Attestation for Embedded Devices

verfasst von : Maximilian Zeiser, Dirk Westhoff

Erschienen in: Innovations for Community Services

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Remote code attestation protocols are an essential building block to offer a reasonable system security for wireless embedded devices. In the work at hand we investigate in detail the trustability of a purely software-based remote code attestation based inference mechanism over the wireless when e.g. running the prominent protocol derivate SoftWare-based ATTestation for Embedded Devices (SWATT). Besides the disclosure of pitfalls of such a protocol class we also point out good parameter choices which allow at least a meaningful plausibility check with a balanced false positive and false negative ratio.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Innovations for High Performance Microelectronics.
 
Literatur
1.
Zurück zum Zitat Armknecht, F., Sadeghi, A.-R., Schulz, S., Wachsmann, C.: A security framework for the analysis, design of software attestation. In: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pp. 1–12. ACM (2013) Armknecht, F., Sadeghi, A.-R., Schulz, S., Wachsmann, C.: A security framework for the analysis, design of software attestation. In: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pp. 1–12. ACM (2013)
2.
Zurück zum Zitat Castelluccia, C., Francillon, A., Perito, D., Soriente, C.: On the difficulty of software-based attestation of embedded devices. In: Proceedings of the 16th ACM conference on Computer and communications security, pp. 400–409. ACM (2009) Castelluccia, C., Francillon, A., Perito, D., Soriente, C.: On the difficulty of software-based attestation of embedded devices. In: Proceedings of the 16th ACM conference on Computer and communications security, pp. 400–409. ACM (2009)
3.
Zurück zum Zitat Che, W., Plusquellic, J., Bhunia, S.: A non-volatile memory based physically unclonable function without helper data. In: 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pp. 148–153. IEEE (2014) Che, W., Plusquellic, J., Bhunia, S.: A non-volatile memory based physically unclonable function without helper data. In: 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pp. 148–153. IEEE (2014)
4.
Zurück zum Zitat Elson, J., Girod, L., Estrin, D.: Fine-grained network time synchronization using reference broadcasts. ACM SIGOPS Operating Syst. Rev. 36(SI), 147–163 (2002)CrossRef Elson, J., Girod, L., Estrin, D.: Fine-grained network time synchronization using reference broadcasts. ACM SIGOPS Operating Syst. Rev. 36(SI), 147–163 (2002)CrossRef
5.
Zurück zum Zitat TCG Mobile Phone Working Group et al.: TCG mobile trusted module specification. In: Trusted Computing Group (2010) TCG Mobile Phone Working Group et al.: TCG mobile trusted module specification. In: Trusted Computing Group (2010)
6.
Zurück zum Zitat Kinney, S.L.: Trusted Platform Module Basics: Using TPM in Embedded Systems. Newnes, Newton (2006) Kinney, S.L.: Trusted Platform Module Basics: Using TPM in Embedded Systems. Newnes, Newton (2006)
7.
Zurück zum Zitat Kovah, X., Kallenberg, C., Weathers, C., Herzog, A., Albin, M., Butterworth, J.: New results for timing-based attestation. In: 2012 IEEE Symposium on Security and Privacy (SP), pp. 239–253. IEEE (2012) Kovah, X., Kallenberg, C., Weathers, C., Herzog, A., Albin, M., Butterworth, J.: New results for timing-based attestation. In: 2012 IEEE Symposium on Security and Privacy (SP), pp. 239–253. IEEE (2012)
8.
Zurück zum Zitat Schulz, S., Wachsmann, C., Sadeghis, A.R.: Lightweight Remote Attestation using Physical Functions, Technische Universitat Darmstadt. Darmstadt. Tech. rep., Germany, Technical report (2011) Schulz, S., Wachsmann, C., Sadeghis, A.R.: Lightweight Remote Attestation using Physical Functions, Technische Universitat Darmstadt. Darmstadt. Tech. rep., Germany, Technical report (2011)
9.
Zurück zum Zitat Seshadri, A., Perrig, A., Van Doorn, L., Khosla, P.: Swatt: software-based attestation for embedded devices. In: Proceedings of the 2004 IEEE Symposium on Security and Privacy, pp. 272–282. IEEE (2004) Seshadri, A., Perrig, A., Van Doorn, L., Khosla, P.: Swatt: software-based attestation for embedded devices. In: Proceedings of the 2004 IEEE Symposium on Security and Privacy, pp. 272–282. IEEE (2004)
10.
Zurück zum Zitat Stecklina, O., Kornemann, S., Grehl, F., Jung, R., Kranz, T., Leander, G., Schweer, D., Mollus, K., Westhoff, D.: Custom-fit security for efficient, pollution-resistant multicast OTA-programming with fountain codes. In: 2015 15th International Conference on Innovations for Community Services (I4CS), pp. 1–8. IEEE (2015) Stecklina, O., Kornemann, S., Grehl, F., Jung, R., Kranz, T., Leander, G., Schweer, D., Mollus, K., Westhoff, D.: Custom-fit security for efficient, pollution-resistant multicast OTA-programming with fountain codes. In: 2015 15th International Conference on Innovations for Community Services (I4CS), pp. 1–8. IEEE (2015)
11.
Zurück zum Zitat Stecklina, O., Langendörfer, P., Vater, F., Kranz, T., Leander, G.: Intrinsic code attestation by instruction chaining for embedded devices. In: Thuraisingham, B., Wang, X.F., Yegneswaran, V. (eds.) Security and Privacy in Communication Networks. LNICSSITE, vol. 164, pp. 97–115. Springer, Heidelberg (2015)CrossRef Stecklina, O., Langendörfer, P., Vater, F., Kranz, T., Leander, G.: Intrinsic code attestation by instruction chaining for embedded devices. In: Thuraisingham, B., Wang, X.F., Yegneswaran, V. (eds.) Security and Privacy in Communication Networks. LNICSSITE, vol. 164, pp. 97–115. Springer, Heidelberg (2015)CrossRef
12.
Zurück zum Zitat Vetter, B., Westhoff, D.: Simulation study on code attestation with compressed instruction code. In: 2012 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pp. 296–301. IEEE (2012) Vetter, B., Westhoff, D.: Simulation study on code attestation with compressed instruction code. In: 2012 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pp. 296–301. IEEE (2012)
Metadaten
Titel
Re-visited: On the Value of Purely Software-Based Code Attestation for Embedded Devices
verfasst von
Maximilian Zeiser
Dirk Westhoff
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-49466-1_6