Property Based Attestation and Trusted Computing: Analysis and Challenges

  • Authors:
  • Aarthi Nagarajan;Vijay Varadharajan;Michael Hitchens;Eimear Gallery

  • Affiliations:
  • -;-;-;-

  • Venue:
  • NSS '09 Proceedings of the 2009 Third International Conference on Network and System Security
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Trusted computing attestation mechanism relies on hash measurements to realize remote party attestation in distributed systems. Property based attestation enables more meaningful attestation by abstracting low level binary values to high level security properties or functions of systems. The contribution of this paper is two fold. In the first part of the paper, we provide an analysis of the different types of property based attestation mechanisms that have been proposed in the recent years. We categorize these mechanisms as derivation based, delegation based and enforcement based and analyze each of them with a particular focus on their limitations. In the second part, we provide a list of challenges for property based attestation. We believe this to be an useful exercise to help better understand the issues that limit the practical applicability of property based attestation in real world systems.