Achieving attestation with less effort: An indirect and configurable approach to integrity reporting

Jun Ho Huh, Hyoungshick Kim, John Lyle, Andrew Martin

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

This paper proposes an indirect attestation paradigm for verifying the trustworthiness of end user platforms. This approach overcomes several criticisms of attestation by maintaining the user's freedom to choose their own software configurations and minimising the whitelist management overhead for the relying party. Each user platform defines its own acceptable software combination in terms of reference integrity measurements, and reports the local verification results to the relying party through a late-launched, trusted Platform Trust Service. The relying party simply checks this verification result and a security meta-policy that has been used to ensure the quality of the security checks performed locally. The Platform Trust Service is also responsible for reporting whether this meta-policy is satisfied. By configuring the meta-policy, the relying party selects an indirect attestation paradigm that best meets their high-level security requirements.

Original languageEnglish
Title of host publicationSTC'11 - Proceedings of the 6th ACM Workshop
Subtitle of host publicationScalable Trusted Computing
Pages31-36
Number of pages6
DOIs
StatePublished - 2011
Externally publishedYes
Event6th ACM Workshop on Scalable Trusted Computing, STC'11 - Co-located with 18th ACM Conference on Computer and Communications Security, CCS 2011 - Chicago, IL, United States
Duration: 17 Oct 201117 Oct 2011

Publication series

NameProceedings of the ACM Conference on Computer and Communications Security
ISSN (Print)1543-7221

Conference

Conference6th ACM Workshop on Scalable Trusted Computing, STC'11 - Co-located with 18th ACM Conference on Computer and Communications Security, CCS 2011
Country/TerritoryUnited States
CityChicago, IL
Period17/10/1117/10/11

Keywords

  • indirect attestation
  • security meta-policy
  • whitelist management

Fingerprint

Dive into the research topics of 'Achieving attestation with less effort: An indirect and configurable approach to integrity reporting'. Together they form a unique fingerprint.

Cite this