Improvement Method of TCG Command Validation Protocol
暂无分享,去创建一个
This paper shows that the Trusted Computing Group(TCG)command validation protocols are exposed to a Dolev-Yao Man in The Middle(MiTM)attack,which will tamper with the security and the trustworthiness of the entire system.In order to avoid such attack,this paper proposes a countermeasure which makes an effective way through which the caller and TPM can well understand the session state of each other.