Scalable Remote Attestation with Privacy Protection

Assurance of fulfillment of stakeholder's expectations on a target platform is termed as remote attestation. Without such an assurance, there is no way of knowing whether the policies of the remote owner will be enforced as expected. Existing approaches toward remote attestation work at different levels of the software stack and most of them only measure binary hashes of the applications on the remote platform. Several dynamic attestation techniques have been proposed that aim to measure the internal working of an application. As there can be more than one application running on a target system, we need to have mechanisms to remotely certify the internal behavior of multiple applications on a single system. Similarly in TCG-based attestations we use Platform Configuration Register (PCR) for storing and advocating the platform configuration to the remote party. Currently a single PCR is used to capture the behavior of one application/purpose. In this paper we propose the idea of using a single PCR for multiple instances of a target application, while preserving the privacy of other application instances. Moreover, our technique also keeps the trusted status of each application intact. We propose a protocol for measurement and verification of a single instance by its respective stakeholder. Further, the mechanism proposed in this paper can be applied to different attestation techniques that work at different levels of the software stack. We develop a proof-of-concept implementation of our idea and provide future implications of this research.

[1]  Fabio Massacci,et al.  The verification of an industrial payment protocol: the SET purchase phase , 2002, CCS '02.

[2]  Jun Ho Huh,et al.  Trustworthy Log Reconciliation for Distributed Virtual Organisations , 2009, TRUST.

[3]  Jean-Pierre Seifert,et al.  Model-based behavioral attestation , 2008, SACMAT '08.

[4]  Trent Jaeger,et al.  Design and Implementation of a TCG-based Integrity Measurement Architecture , 2004, USENIX Security Symposium.

[5]  Jaehong Park,et al.  Towards usage control models: beyond traditional access control , 2002, SACMAT '02.

[6]  Hovav Shacham,et al.  When good instructions go bad: generalizing return-oriented programming to RISC , 2008, CCS.

[7]  Stefan Katzenbeisser,et al.  Improving the scalability of platform attestation , 2008, STC '08.

[8]  Trent Jaeger,et al.  PRIMA: policy-reduced integrity measurement architecture , 2006, SACMAT '06.

[9]  Stefan Berger,et al.  vTPM: Virtualizing the Trusted Platform Module , 2006, USENIX Security Symposium.

[10]  Julian Bradfield CONCUR '96: Concurrency Theory , 1996 .

[11]  Ahmad-Reza Sadeghi,et al.  Property-based attestation for computing platforms: caring about properties, not mechanisms , 2004, NSPW '04.

[12]  John Lyle Trustable Remote Verification of Web Services , 2009, TRUST.

[13]  J. Aaron Pendergrass,et al.  Linux kernel integrity measurement using contextual inspection , 2007, STC '07.

[14]  Xinwen Zhang,et al.  Remote Attestation of Attribute Updates and Information Flows in a UCON System , 2009, TRUST.

[15]  J. Aaron Pendergrass,et al.  Improving coherency of runtime integrity measurement , 2008, STC '08.

[16]  Ravi S. Sandhu,et al.  Safety analysis of usage control authorization models , 2006, ASIACCS '06.

[17]  Ahmad-Reza Sadeghi,et al.  Property-Based TPM Virtualization , 2008, ISC.

[18]  Robert H. Deng,et al.  Remote attestation on program execution , 2008, STC '08.

[19]  Xinwen Zhang,et al.  Behavioral attestation for web services (BA4WS) , 2008, SWS '08.

[20]  Aaron Weiss Trusted computing , 2006, NTWK.

[21]  Jean-Jacques Lévy,et al.  A Calculus of Mobile Agents , 1996, CONCUR.