Conference Proceeding Article
Many popular modern processors include an important hardware security feature in the form of a DRTM (Dynamic Root of Trust for Measurement) that helps bootstrap trust and resists software attacks. However, despite substantial body of prior research on trust establishment, security of DRTM was treated without involvement of the human user, who represents a vital missing link. The basic challenge is: how can a human user determine whether an expected DRTM is currently active on her device? In this paper, we define the notion of “presence attestation”, which is based on mandatory, though minimal, user participation. We present three concrete presence attestation schemes: sightbased, location-based and scene-based. They vary in terms of security and usability features, and are suitable for different application contexts. After analyzing their security, we assess their usability and performance based on prototype implementations.
trusted computing, attestation, dynamic root of trust, human-inthe-loop, device I/O
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, TX, October 30-November 03
City or Country
ZHANG, Zhangkai; DING, Xuhua; TSUDIK, Gene; CUI, Jinhua; and LI, Zhoujun.
Presence attestation: The missing link in dynamic trust bootstrapping. (2017). Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, TX, October 30-November 03. 1-14. Research Collection School Of Information Systems.
Available at: http://ink.library.smu.edu.sg/sis_research/3877
Creative Commons License
This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 4.0 License.