Title
Replay Attack in TCG Specification and Solution
Abstract
We prove the existence of a flaw which we individuated in the design of the Object-Independent Authorization Protocol (OIAP), which represents one of the building blocks of the Trusted Platform Module (TPM), the core of the Trusted Computing Platforms (TPs) as devised by the Trusted Computing Group (TCG) standards. In particular, we prove, also with the support of a model checker, that the protocol is exposed to replay attacks, which could be used for compromising the correct behavior of a TP. We also propose a countermeasure to undertake in order to avoid such an attack as well as any replay attacks to the aforementioned protocol.
Year
DOI
Venue
2005
10.1109/CSAC.2005.47
Tucson, AZ
Keywords
Field
DocType
replay attack,model checker,object-independent authorization protocol,building block,tcg specification,trusted platform module,correct behavior,aforementioned protocol,trusted computing platforms,trusted computing group,authorisation,formal specification
Countermeasure,Trusted Computing,Model checking,Computer science,Computer security,Otway–Rees protocol,Trusted Platform Module,Formal specification,Direct Anonymous Attestation,Replay attack
Conference
Volume
ISSN
ISBN
10
1063-9527
0-7695-2461-3
Citations 
PageRank 
References 
22
1.28
12
Authors
4
Name
Order
Citations
PageRank
Danilo Bruschi177170.35
Lorenzo Cavallaro288652.85
Andrea Lanzi384540.99
Mattia Monga454344.24