TY - GEN
T1 - Achieving attestation with less effort
T2 - 6th ACM Workshop on Scalable Trusted Computing, STC'11 - Co-located with 18th ACM Conference on Computer and Communications Security, CCS 2011
AU - Huh, Jun Ho
AU - Kim, Hyoungshick
AU - Lyle, John
AU - Martin, Andrew
PY - 2011
Y1 - 2011
N2 - This paper proposes an indirect attestation paradigm for verifying the trustworthiness of end user platforms. This approach overcomes several criticisms of attestation by maintaining the user's freedom to choose their own software configurations and minimising the whitelist management overhead for the relying party. Each user platform defines its own acceptable software combination in terms of reference integrity measurements, and reports the local verification results to the relying party through a late-launched, trusted Platform Trust Service. The relying party simply checks this verification result and a security meta-policy that has been used to ensure the quality of the security checks performed locally. The Platform Trust Service is also responsible for reporting whether this meta-policy is satisfied. By configuring the meta-policy, the relying party selects an indirect attestation paradigm that best meets their high-level security requirements.
AB - This paper proposes an indirect attestation paradigm for verifying the trustworthiness of end user platforms. This approach overcomes several criticisms of attestation by maintaining the user's freedom to choose their own software configurations and minimising the whitelist management overhead for the relying party. Each user platform defines its own acceptable software combination in terms of reference integrity measurements, and reports the local verification results to the relying party through a late-launched, trusted Platform Trust Service. The relying party simply checks this verification result and a security meta-policy that has been used to ensure the quality of the security checks performed locally. The Platform Trust Service is also responsible for reporting whether this meta-policy is satisfied. By configuring the meta-policy, the relying party selects an indirect attestation paradigm that best meets their high-level security requirements.
KW - indirect attestation
KW - security meta-policy
KW - whitelist management
UR - https://www.scopus.com/pages/publications/80755167791
U2 - 10.1145/2046582.2046589
DO - 10.1145/2046582.2046589
M3 - Conference contribution
AN - SCOPUS:80755167791
SN - 9781450310017
T3 - Proceedings of the ACM Conference on Computer and Communications Security
SP - 31
EP - 36
BT - STC'11 - Proceedings of the 6th ACM Workshop
Y2 - 17 October 2011 through 17 October 2011
ER -