TUM Logo

Policy-based implicit attestation for microkernel-based virtualized systems

We present an attestation mechanism that enables a remote verifier to implicitly evaluate the trustworthiness of the prover’s system through policies. Those policies are verified and enforced by a TPM 2.0, when the attestor interacts with a virtualized hardware component of the prover’s system. For instance, when the verifier reads a virtualized sensor device and requests integrity-protected sensor data, such as the average temperature, a heartbeat value, or an anomaly detection score, the prover’s TPM, which acts as a trust anchor, checks and enforces the policies specified by the verifier. The prover, in turn, is also able to define policies, which can limit access to certain hardware components and are also enforced by the TPM. As a result, both parties have to cooperate for a successful attestation, which implicitly creates verifiable proof of the prover’s trustworthiness using mainly symmetric instead of expensive asymmetric cryptographic operations like digital signatures.

Policy-based implicit attestation for microkernel-based virtualized systems

Information security. 19th international conference, ISC 2016

Authors: Steffen Wagner and Claudia Eckert
Year/month: 2016/9
Booktitle: Information security. 19th international conference, ISC 2016
Pages: 305-322
Address: Honolulu, HI, USA
Fulltext: click here

Abstract

We present an attestation mechanism that enables a remote verifier to implicitly evaluate the trustworthiness of the prover’s system through policies. Those policies are verified and enforced by a TPM 2.0, when the attestor interacts with a virtualized hardware component of the prover’s system. For instance, when the verifier reads a virtualized sensor device and requests integrity-protected sensor data, such as the average temperature, a heartbeat value, or an anomaly detection score, the prover’s TPM, which acts as a trust anchor, checks and enforces the policies specified by the verifier. The prover, in turn, is also able to define policies, which can limit access to certain hardware components and are also enforced by the TPM. As a result, both parties have to cooperate for a successful attestation, which implicitly creates verifiable proof of the prover’s trustworthiness using mainly symmetric instead of expensive asymmetric cryptographic operations like digital signatures.

Bibtex:

@inproceedings { Wagner2016,
author = { Steffen Wagner and Claudia Eckert},
title = { Policy-based implicit attestation for microkernel-based virtualized systems },
year = { 2016 },
month = { September },
booktitle = { Information security. 19th international conference, ISC 2016 },
address = { Honolulu, HI, USA },
pages = { 305-322 },
url = { http://dx.doi.org/10.1007/978-3-319-45871-7_19 },

}