Remote attestation for low-end embedded devices: The prover's perspective

Security of embedded devices is a timely and important issue, due to the proliferation of these devices into numerous and diverse settings, as well as their growing popularity as attack targets, especially, via remote malware infestations. One important defense mechanism is remote attestation, where...

Full description

Bibliographic Details
Main Authors: Brasser, F, Rasmussen, K, Sadeghi, A, Tsudik, G
Format: Conference item
Published: Association for Computing Machinery 2016
_version_ 1797071927524720640
author Brasser, F
Rasmussen, K
Sadeghi, A
Tsudik, G
author_facet Brasser, F
Rasmussen, K
Sadeghi, A
Tsudik, G
author_sort Brasser, F
collection OXFORD
description Security of embedded devices is a timely and important issue, due to the proliferation of these devices into numerous and diverse settings, as well as their growing popularity as attack targets, especially, via remote malware infestations. One important defense mechanism is remote attestation, whereby a trusted, and possibly remote, party (verifier) checks the internal state of an untrusted, and potentially compromised, device (prover). Despite much prior work, remote attestation remains a vibrant research topic. However, most attestation schemes naturally focus on the scenario where the verifier is trusted and the prover is not. The opposite setting - -where the prover is benign, and the verifier is malicious - -has been side-stepped. To this end, this paper considers the issue of prover security, including: verifier impersonation, denial-of-service (DoS) and replay attacks, all of which result in unauthorized invocation of attestation functionality on the prover. We argue that protection of the prover from these attacks must be treated as an important component of any remote attestation method. We formulate a new roaming adversary model for this scenario and present the trade-offs involved in countering this threat. We also identify new features and methods needed to protect the prover with minimal additional requirements.
first_indexed 2024-03-06T23:00:20Z
format Conference item
id oxford-uuid:61e33403-6e37-48e4-833f-84706cb156c9
institution University of Oxford
last_indexed 2024-03-06T23:00:20Z
publishDate 2016
publisher Association for Computing Machinery
record_format dspace
spelling oxford-uuid:61e33403-6e37-48e4-833f-84706cb156c92022-03-26T18:02:48ZRemote attestation for low-end embedded devices: The prover's perspectiveConference itemhttp://purl.org/coar/resource_type/c_5794uuid:61e33403-6e37-48e4-833f-84706cb156c9Symplectic Elements at OxfordAssociation for Computing Machinery2016Brasser, FRasmussen, KSadeghi, ATsudik, GSecurity of embedded devices is a timely and important issue, due to the proliferation of these devices into numerous and diverse settings, as well as their growing popularity as attack targets, especially, via remote malware infestations. One important defense mechanism is remote attestation, whereby a trusted, and possibly remote, party (verifier) checks the internal state of an untrusted, and potentially compromised, device (prover). Despite much prior work, remote attestation remains a vibrant research topic. However, most attestation schemes naturally focus on the scenario where the verifier is trusted and the prover is not. The opposite setting - -where the prover is benign, and the verifier is malicious - -has been side-stepped. To this end, this paper considers the issue of prover security, including: verifier impersonation, denial-of-service (DoS) and replay attacks, all of which result in unauthorized invocation of attestation functionality on the prover. We argue that protection of the prover from these attacks must be treated as an important component of any remote attestation method. We formulate a new roaming adversary model for this scenario and present the trade-offs involved in countering this threat. We also identify new features and methods needed to protect the prover with minimal additional requirements.
spellingShingle Brasser, F
Rasmussen, K
Sadeghi, A
Tsudik, G
Remote attestation for low-end embedded devices: The prover's perspective
title Remote attestation for low-end embedded devices: The prover's perspective
title_full Remote attestation for low-end embedded devices: The prover's perspective
title_fullStr Remote attestation for low-end embedded devices: The prover's perspective
title_full_unstemmed Remote attestation for low-end embedded devices: The prover's perspective
title_short Remote attestation for low-end embedded devices: The prover's perspective
title_sort remote attestation for low end embedded devices the prover s perspective
work_keys_str_mv AT brasserf remoteattestationforlowendembeddeddevicestheproversperspective
AT rasmussenk remoteattestationforlowendembeddeddevicestheproversperspective
AT sadeghia remoteattestationforlowendembeddeddevicestheproversperspective
AT tsudikg remoteattestationforlowendembeddeddevicestheproversperspective