2013
DOI: 10.1007/978-3-319-02726-5_11
|View full text |Cite
|
Sign up to set email alerts
|

Type-Based Analysis of Protected Storage in the TPM

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0
1

Year Published

2014
2014
2020
2020

Publication Types

Select...
4
2
1

Relationship

3
4

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 10 publications
0
2
0
1
Order By: Relevance
“…Related Work. A few researches have been done for the formal analysis and verification of the TPM 2.0 specifications on direct anonymous attestation [13,14], protected storage [15], and the traditional HMAC-based authorization [16]. However, there are no results about the formal verification of TPM 2.0 EA mechanism as far as we know.…”
Section: Introductionmentioning
confidence: 94%
“…Related Work. A few researches have been done for the formal analysis and verification of the TPM 2.0 specifications on direct anonymous attestation [13,14], protected storage [15], and the traditional HMAC-based authorization [16]. However, there are no results about the formal verification of TPM 2.0 EA mechanism as far as we know.…”
Section: Introductionmentioning
confidence: 94%
“…Although many types of research have been done for the analysis of the TPM2.0 specification on direct anonymous attestation [14, 15], protected storage [16, 17], and enhanced authorisation [18], few works have been done on TPM2.0 HMAC authorisation mechanism. In [19], the authors provide a proof of the HMAC authorisation protocols in a computational model.…”
Section: Introductionmentioning
confidence: 99%
“…同时 还针对 TPM 2.0 技术规范草案中所采纳的 DAA 协议接口进行了安全分析 [12] , 突破性地发现 TPM [14] . 密钥存储安全方面, 采 用类型系统的方法对密钥存储保护进行分析, 利用定理证明方法证明了 TPM 2.0 密钥层次保护功能 是安全的 [15] . 密钥协商方面, 我们在 CK 模型下分析了 TPM 2.0 的两阶段密钥协商 API 接口, 发现 密钥协商存在一定的安全隐患, 攻击者可利用暴露的中间 Z 值实施 UKS (unknown key share) 和 KCI (key-compromise impersonation) 攻击 [16] .…”
unclassified