Proceedings of the 15th ACM Asia Conference on Computer and Communications Security 2020
DOI: 10.1145/3320269.3372197
|View full text |Cite
|
Sign up to set email alerts
|

Formal Analysis and Implementation of a TPM 2.0-based Direct Anonymous Attestation Scheme

Abstract: Direct Anonymous Attestation (Daa) is a set of cryptographic schemes used to create anonymous digital signatures. To provide additional assurance, Daa schemes can utilise a Trusted Platform Module (Tpm) that is a tamper-resistant hardware device embedded in a computing platform and which provides cryptographic primitives and secure storage. We extend Chen and Li's Daa scheme to support: 1) signing a message anonymously, 2) self-certifying Tpm keys, and 3) ascertaining a platform's state as recorded by the Tpm'… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1
1

Relationship

3
4

Authors

Journals

citations
Cited by 23 publications
(27 citation statements)
references
References 23 publications
0
27
0
Order By: Relevance
“…Such analyses can expose threats which can then be mitigated. Formal analysis has already been conducted for WebAuthn [16] and our experience of formally analysing direct anonymous attestation protocols will also be relevant [36]. Furthermore, a reference implementation of the architecture will also serve to promote discussion with industry.…”
Section: Discussionmentioning
confidence: 99%
“…Such analyses can expose threats which can then be mitigated. Formal analysis has already been conducted for WebAuthn [16] and our experience of formally analysing direct anonymous attestation protocols will also be relevant [36]. Furthermore, a reference implementation of the architecture will also serve to promote discussion with industry.…”
Section: Discussionmentioning
confidence: 99%
“…As TPM is a mature technology, vulnerabilities get fixed. Indeed, there have been several works that formally verify various aspects of the TPM standard [81][82][83]. We have not analyzed the timing channel of the runtime we have developed for security-critical programs.…”
Section: Security Analysismentioning
confidence: 99%
“…Tamarin and SAPiC have already been used successfully for modelling TPM functionalities in existing works, e.g., [23,22,29], and they offer a convenient syntax for modelling protocols with global state. However, as mentioned above, it is rather challenging to model protocols with arbitrarily mutable global state, as it is required in the scenario presented in this paper.…”
Section: The Tamarin Prover and Sapicmentioning
confidence: 99%
“…Some notable examples in the context of the TPM are the works by Shao et al, which cover specific subsets of TPM functionalities, such as Enhanced Authorization (EA) [23] or HMAC authorization [22], identifying misuse cases. Also, Xi et al [30] and Wesemeyer et al [29] conduct formal analysis and verification of the the Direct Anonymous Attestation (DAA) protocol of the TPM. On the other hand, Delaune et al [10], propose a Horn-clause framework where they prove its soundness and use ProVerif to approximate the TPM internal state space, helping to address non-termination issues.…”
Section: Introductionmentioning
confidence: 99%