Survivable key compromise in software update systems

  • Authors:
  • Justin Samuel;Nick Mathewson;Justin Cappos;Roger Dingledine

  • Affiliations:
  • UC Berkeley, Berkeley, CA, USA;The Tor Project, Cambridge, MA, USA;University of Washington, Seattle, WA, USA;The Tor Project, Cambridge, MA, USA

  • Venue:
  • Proceedings of the 17th ACM conference on Computer and communications security
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Today's software update systems have little or no defense against key compromise. As a result, key compromises have put millions of software update clients at risk. Here we identify three classes of information whose authenticity and integrity are critical for secure software updates. Analyzing existing software update systems with our framework, we find their ability to communicate this information securely in the event of a key compromise to be weak or nonexistent. We also find that the security problems in current software update systems are compounded by inadequate trust revocation mechanisms. We identify core security principles that allow software update systems to survive key compromise. Using these ideas, we design and implement TUF, a software update framework that increases resilience to key compromise.