ZEKRA: Zero-Knowledge Control-Flow Attestation
Authors/Creators
- 1. Technical University of Denmark (DTU)
- 2. Aalborg University
- 3. Ubitech Ltd.
Description
To detect runtime attacks against programs running on a remote computing platform, Control-Flow Attestation (CFA) lets a (trusted) verifier determine the legality of the program’s execution path, as recorded and reported by the remote platform (prover). However, besides complicating scalability due to verifier complexity, this assumption regarding the verifier’s trustworthiness renders existing CFA schemes prone to privacy breaches and implementation dis- closure attacks under “honest-but-curious” adversaries. Thus, to suppress sensitive details from the verifier, we propose to have the prover outsource the verification of the attested execution path to an intermediate worker of which the verifier only learns the result. However, since a worker might be dishonest about the outcome of the verification, we propose a purely cryptographical solution of transforming the verification of the attested execution path into a verifiable computational task that can be reliably outsourced to a worker without relying on any trusted execution environment. Specifically, we propose to express a program-agnostic execution path verification task inside an arithmetic circuit whose correct execution can be verified by untrusted verifiers in zero knowledge.
Notes
Files
asiaccs2023-25.pdf
Files
(2.4 MB)
| Name | Size | Download all |
|---|---|---|
|
md5:1da9eeb332eb7bc7fc97396693a315d7
|
2.4 MB | Preview Download |