Title
Security verification of hardware-enabled attestation protocols
Abstract
Hardware-software security architectures can significantly improve the security provided to computer users. However, we are lacking a security verification methodology that can provide design-time verification of the security properties provided by such architectures. While verification of an entire hardware-software security architecture is very difficult today, this paper proposes a methodology for verifying essential aspects of the architecture. We use attestation protocols proposed by different hardware security architectures as examples of such essential aspects. Attestation is an important and interesting new requirement for having trust in a remote computer, e.g., in a cloud computing scenario. We use a finite-state model checker to model the system and the attackers, and check the security of the protocols against attacks. We provide new actionable heuristics for designing invariants that are validated by the model checker and thus used to detect potential attacks. The verification ensures that the invariants hold and the protocol is secure. Otherwise, the protocol design is updated on a failure and the verification is re-run.
Year
DOI
Venue
2012
10.1109/MICROW.2012.16
MICRO Workshops
Keywords
DocType
ISBN
protocol design,finite state machines,hardware-enabled attestation protocols,hardware-software security architecture,design-time verification,security verification,software architecture,security properties,cryptographic protocols,security verification methodology,remote computer,program verification,finite state model checker
Conference
978-1-4673-4920-8
Citations 
PageRank 
References 
0
0.34
24
Authors
3
Name
Order
Citations
PageRank
Tianwei Zhang18621.44
Jakub Szefer239837.00
Ruby Lee32460261.28