Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security 2015
DOI: 10.1145/2714576.2714610
|View full text |Cite
|
Sign up to set email alerts
|

Formal Analysis of Enhanced Authorization in the TPM 2.0

Abstract: The Trusted Platform Module (TPM) is a system component that provides a hardware-based approach to establish trust in a platform by providing protected storage, robust platform integrity measurement, secure platform attestation and other secure functionalities. The access to TPM commands and TPM-resident key objects are protected via an authorization mechanism. Enhanced Authorization (EA) is a new mechanism introduced by the TPM 2.0 to provide a rich authorization model for specifying flexible access control p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
10
0
1

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
2
2

Relationship

2
6

Authors

Journals

citations
Cited by 16 publications
(11 citation statements)
references
References 19 publications
0
10
0
1
Order By: Relevance
“…In [19], [20], Delaune et al analyse parts of the Trusted Platform Module (TPM) [21] instruction set using ProVerif. In [22], Shao et al model the enhanced authorization mechanism introduced in the TPM 2.0 specification and analyse it using SAPIC. These approaches are however different in the sense that they model some instructions offered by the TPM, while we directly add a report mechanism to the language.…”
Section: Related Workmentioning
confidence: 99%
“…In [19], [20], Delaune et al analyse parts of the Trusted Platform Module (TPM) [21] instruction set using ProVerif. In [22], Shao et al model the enhanced authorization mechanism introduced in the TPM 2.0 specification and analyse it using SAPIC. These approaches are however different in the sense that they model some instructions offered by the TPM, while we directly add a report mechanism to the language.…”
Section: Related Workmentioning
confidence: 99%
“…In our modelling of the Yubikey the server can handle several requests from different devices in parallel, which was not possible in the direct modelling in [21]. Another example is the model of the enhanced authorization mechanism introduced in the TPM 2.0 specification by Shao et al [32]. In this work, a model of the TPM that executes API commands sequentially is compared to one that executes them in parallel, finding flaws in the parallel version.…”
Section: Related Workmentioning
confidence: 99%
“…The present calculus and verification method have been used to verify a configuration of the key-management API PKCS#11 [20] and was extended with loops to allow for the analysis of the streaming protocol TESLA [25]. In [32], Shao et al used our tool to analyse the enhanced authorization mechanism introduced in the TPM 2.0 specification.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…HMAC 授权会话方面, 我们在计算模型下使用安全协议验 证工具 CryptoVerif 分析了 TPM 2.0 的 HMAC 授权, 证明 HMAC 授权会话满足认证性 [17] . 策略授 权方面, 采用应用 Pi 演算形式化分析了 TPM 2.0 的策略授权安全机制, 通过 Tarmarin 自动化验证工 具我们发现 NV 策略授权存在 TOCTOU 攻击 [18] . DAA 协议接口方面, 我们发现 TPM 2.0 规范所实 现的 DAA 协议 API 存在 Static DH oracle 攻击的风险 [19] , 并且基于进程代数对 DAA 协议实现建模 分析, 利用进程演算验证工具 ProVerif 自动化分析发现 DAA 协议不满足前向匿名性.…”
unclassified