Publication Type

Conference Proceeding Article

Version

publishedVersion

Publication Date

11-2017

Abstract

Many popular modern processors include an important hardware security feature in the form of a DRTM (Dynamic Root of Trust for Measurement) that helps bootstrap trust and resists software attacks. However, despite substantial body of prior research on trust establishment, security of DRTM was treated without involvement of the human user, who represents a vital missing link. The basic challenge is: how can a human user determine whether an expected DRTM is currently active on her device? In this paper, we define the notion of “presence attestation”, which is based on mandatory, though minimal, user participation. We present three concrete presence attestation schemes: sightbased, location-based and scene-based. They vary in terms of security and usability features, and are suitable for different application contexts. After analyzing their security, we assess their usability and performance based on prototype implementations.

Keywords

trusted computing, attestation, dynamic root of trust, human-inthe-loop, device I/O

Discipline

Information Security

Research Areas

Cybersecurity

Publication

CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, TX, October 30-November 03

First Page

89

Last Page

102

ISBN

9781450349468

Identifier

10.1145/3133956.3134094

Publisher

ACM

City or Country

New York

Copyright Owner and License

Publisher

Additional URL

https://doi.org/10.1145/3133956.3134094

Share

COinS