Published October 4, 2021 | Version v1
Conference paper Open

Root-of-Trust Abstractions for Symbolic Analysis: Application to Attestation Protocols

  • 1. SnT, University of Luxembourg
  • 2. School of Computer Science, University of Birmingham
  • 3. Ubitech Ltd
  • 4. Surrey Centre for Cyber Security, University of Surrey

Description

A key component in building trusted computing services is a highly secure anchor that serves as a Root-of-Trust (RoT). There are
several works that conduct formal analysis on the security of such commodity RoTs (or parts of it), and also a few ones devoted to verifying the trusted computing service as a whole. However, most of the existing schemes try to verify security without di erentiating the internal cryptography mechanisms of the underlying hardware token from the client application cryptography. This approach limits, to some extent, the reasoning that can be made about the level of assurance of the overall system by automated reasoning tools. In this work, we present a methodology that enables the use of formal veri cation tools towards verifying complex protocols using trusted computing. The focus is on reasoning about the overall application security, provided from the integration of the RoT services, and how these can translate to larger systems when the underlying cryptographic engine is considered perfectly secure. Using the Tamarin
prover, we demonstrate the feasibility of our approach by instantiating it for a TPM-based remote attestation service, which is one of the core security services needed in today's increased attack landscape.

Files

ESORICS_2021_paper.pdf

Files (1.1 MB)

Name Size Download all
md5:58993ae040207022253e742fcc35a146
1.1 MB Preview Download

Additional details

Funding

European Commission
ASSURED - Future Proofing of ICT Trust Chains: Sustainable Operational Assurance and Verification Remote Guards for Systems-of-Systems Security and Privacy 952697