2010 International Conference on Computer Application and System Modeling (ICCASM 2010) 2010
DOI: 10.1109/iccasm.2010.5623264
|View full text |Cite
|
Sign up to set email alerts
|

Expand the SSL/TLS protocol on Trusted Platform Module

Abstract: In this paper, we discuss security issues of the current SSL/TLS protocol and pay attention to the security vulnerabilities of the expansion of SSL/TLS protocol based on the TPM (Trusted Platform Module). We experiment on one attacking technique that can damage the security of SSL/TLS protocol successfully. Finally, considering the application environment of SSL/TLS protocol, we propose a specific solution to solve the security problem.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2013
2013
2017
2017

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 2 publications
0
3
0
Order By: Relevance
“…One of the web service framework using attestation mechanism was proposed by Yue et al [7] which uses SSL/TLS extension to perform attestation. The extension contains an attestation data, named AttestExtData and created at each client and server.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…One of the web service framework using attestation mechanism was proposed by Yue et al [7] which uses SSL/TLS extension to perform attestation. The extension contains an attestation data, named AttestExtData and created at each client and server.…”
Section: Related Workmentioning
confidence: 99%
“…We embed the remote attestation protocol into the TLS extension following the Yue-Hao-Yanan method [7]. We modified the NSS and OpenSSL library to add remote attestation protocol into the TLS protocol.…”
Section: A Yue-hao-yanan Implementationmentioning
confidence: 99%
“…They also do not clearly describe which TLS handshake message they use for the negotiation of the proposed channel. The approach described by Yu et al [151] also combines TPM-based platform configuration data with the TLS protocol. The authors strongly focus on the TLS renegotiation attack [see 102].…”
Section: Trusted Platform Module Based Approachesmentioning
confidence: 99%