2021
DOI: 10.48550/arxiv.2101.06362
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

SEDAT:Security Enhanced Device Attestation with TPM2.0

Avani Dave,
Monty Wiseman,
David Safford

Abstract: Remote attestation is one of the ways to verify the state of an untrusted device. Earlier research has attempted remote verification of a device's state using hardware, software, or hybrid approaches. Majority of them have used Attestation Key as a hardware root of trust, which does not detect hardware modification or couterfiet issues. In addition, they do not have a secure communication channel between verifier and prover, which makes them susceptible to mordern security attacks. This paper presents SEDAT, a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(6 citation statements)
references
References 8 publications
0
6
0
Order By: Relevance
“…We can for example mention the Evil Maid attack [46] which consists in capturing the device while it is left unattended (for example in a hotel room) and then making the desired alterations on the system. We can also note that protecting the system from these attacks is seldom considered [47], [48], [49], [50].…”
Section: ) General-purpose Computersmentioning
confidence: 99%
See 4 more Smart Citations
“…We can for example mention the Evil Maid attack [46] which consists in capturing the device while it is left unattended (for example in a hotel room) and then making the desired alterations on the system. We can also note that protecting the system from these attacks is seldom considered [47], [48], [49], [50].…”
Section: ) General-purpose Computersmentioning
confidence: 99%
“…It is the element which is considered as de facto secure. In the case of secure boot this element can be a piece of software like a first stage bootloader [109], [110] or a hardware module like a TPM [46], [50], [111], [112], a smartcard [112], [113] or another hardware module [114], [115]. The next layer is measured by the current one then this measurement is verified.…”
Section: A Backgroundmentioning
confidence: 99%
See 3 more Smart Citations