2022 IEEE Computer Society Annual Symposium on VLSI (ISVLSI) 2022
DOI: 10.1109/isvlsi54635.2022.00099
|View full text |Cite
|
Sign up to set email alerts
|

Securing hard drives with the Security Protocol and Data Model (SPDM)

Abstract: Efforts to secure computing systems via software traditionally focus on the operating system and application levels. In contrast, the Security Protocol and Data Model (SPDM) tackles firmware level security challenges, which are much harder (if at all possible) to detect with regular protection software. SPDM includes key features like enabling peripheral authentication, authenticated hardware measurements retrieval, and secure session establishment. Since SPDM is a relatively recent proposal, there is a lack o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0
1

Year Published

2023
2023
2025
2025

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 10 publications
0
1
0
1
Order By: Relevance
“…In addition, the PCI express (PCIe) integrity and data encryption key management (IDE_KM) protocol [33] for link encryption and other application protocols are built on top of the SPDM protocol. It standardizes the authentication of hardware components and enables the establishment of secure communication channels among them [34]. The protocol allows endpoints to discover and negotiate each other's security capabilities and to retrieve each other's measurements, which include the configurations of the hardware and the firmware.…”
Section: Threat Model and An Overview Of Spdm Protocolmentioning
confidence: 99%
“…In addition, the PCI express (PCIe) integrity and data encryption key management (IDE_KM) protocol [33] for link encryption and other application protocols are built on top of the SPDM protocol. It standardizes the authentication of hardware components and enables the establishment of secure communication channels among them [34]. The protocol allows endpoints to discover and negotiate each other's security capabilities and to retrieve each other's measurements, which include the configurations of the hardware and the firmware.…”
Section: Threat Model and An Overview Of Spdm Protocolmentioning
confidence: 99%
“…Recentemente, o TLS influenciou a especificac ¸ão do SPDM (Security Protocol and Data Model), um padrão aberto proposto pela DMTF (Distributed Management Task Force) que define um conjunto de mecanismos e formatos para autenticac ¸ão de hardware e firmware [DMTF 2023]. O SPDM pode ser usado por exemplo para aumentar a seguranc ¸a nas leituras e escritas de um disco rígido [Alves et al 2022]. Dada a relac ¸ão entre o TLS e o SPDM e a descoberta de falhas em implementac ¸ões do TLS com o uso de fuzzers [Beurdouche et al 2017], é razoável considerar a seguinte pergunta de pesquisa: Qual a eficácia de adaptar fuzzers do TLS para o SPDM?…”
Section: Introduc ¸ãOunclassified