2011
DOI: 10.1007/978-3-642-21599-5_22
|View full text |Cite
|
Sign up to set email alerts
|

Catching the Cuckoo: Verifying TPM Proximity Using a Quote Timing Side-Channel

Abstract: We present a Trusted Platform Module (TPM) application protocol that detects a certain man in the middle attack where an adversary captures and replaces a legitimate computing platform with an imposter that forwards platform authentication challenges to the captive over a high speed data link. This revised Cuckoo attack allows the imposter to satisfy a user's query of platform integrity, tricking the user into divulging sensitive information to the imposter. Our protocol uses an ordinary smart card to verify t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 6 publications
0
7
0
Order By: Relevance
“…The attestation of the HETEE box is implemented on SC, which is included in our TCB and protected from physical attacks for controlling the box (see Sec.VII). Also, solutions have been proposed for mitigating the threat of the Cuckoo attack [119], [120], which could be incorporated into our attestation protocol.…”
Section: Trust Establishmentmentioning
confidence: 99%
“…The attestation of the HETEE box is implemented on SC, which is included in our TCB and protected from physical attacks for controlling the box (see Sec.VII). Also, solutions have been proposed for mitigating the threat of the Cuckoo attack [119], [120], which could be incorporated into our attestation protocol.…”
Section: Trust Establishmentmentioning
confidence: 99%
“…Fink at al. [21] suggest measuring the round trip times of requests to the trusted device to detect if it is in the proximity of the verifier. Zhang et al [46] also investigate the problem of a human user distinguishing genuine secure hardware from adversarial devices.…”
Section: Trusted Computing and Cuckoo Attackmentioning
confidence: 99%
“…We argue that regarding now, any potential threats from Intel ME (Management Engine) which is referred to as Ring minus 3 and has a dedicated processor, in the consideration that all rely on ad-hoc vulnerabilities and this topic is still under open discussion [13]. TPM relay attack [14]. A man-in-the-middle (MitM) attack specifically targeting TPM-like devices impersonates and forwards requests to a (remote) legitimate device, pretending its proximity or co-location on the same machine, to either learn the secrets or forge authentication/attestation results.…”
Section: H Porting Effortmentioning
confidence: 99%