2008
DOI: 10.1016/j.entcs.2007.10.014
|View full text |Cite
|
Sign up to set email alerts
|

Remote Attestation on Legacy Operating Systems With Trusted Platform Modules

Abstract: A lot of progress has been made to secure network communication, e.g., through the use of cryptographic algorithms. However, this offers only a partial solution as long as the communicating end points still suffer from security problems. A number of applications require remote verification of software executing on an untrusted platform. Trusted computing solutions propose to solve this problem through software and hardware changes, typically a secure operating system and the addition of a secure coprocessor re… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2009
2009
2017
2017

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 40 publications
(19 citation statements)
references
References 14 publications
0
19
0
Order By: Relevance
“…Other mechanisms that use trusted hardware are proposed by Schellekens et al [153] and PUF-based protocols [123,135,154].…”
Section: Related Workmentioning
confidence: 99%
“…Other mechanisms that use trusted hardware are proposed by Schellekens et al [153] and PUF-based protocols [123,135,154].…”
Section: Related Workmentioning
confidence: 99%
“…In contrast to the existing schemes, 7,8 in this study, the builtin independent system clock inside the remote agent is employed to locally measure T Elp , which is independent of the wireless transmission delay. Both schemes 11,20 have demonstrated the effectiveness of local elapsed time measurement and therefore a remote attestation scheme employing such a technique is particularly suitable for a multihop communication between the verifier and the prover. Furthermore, an expected T Elp ensures that the checksum computation is executed under an uninterrupted environment.…”
Section: Security Assumptions and Attack Model Of The Cluster-based Wsnmentioning
confidence: 99%
“…a TPM), which can be a tamper-resistant storage or an isolated environment. Both TPM-based schemes 11,12 have been proposed for attesting the system integrity of a primary platform. Defrawy et al 28 proposed SMART relying on a dedicated circuit used for providing access control to a secret key.…”
Section: Other Related Work Of Remote Attestation Schemesmentioning
confidence: 99%
See 1 more Smart Citation
“…Attestation schemes [37,39] and approaches to secure roaming [25] can be used to ensure that a remote (untrusted) device guarantees certain behavior using trusted hardware. Trusted hardware can also be used to store cryptographic keys or bind protected data to a machine [42,2,18,22,16,21].…”
Section: Context Determinationmentioning
confidence: 99%