Catching the cuckoo: verifying TPM proximity using a quote timing side-channel

  • Authors:
  • Russell A. Fink;Alan T. Sherman;Alexander O. Mitchell;David C. Challener

  • Affiliations:
  • Johns Hopkins University, Applied Physics Laboratory and University of Maryland Baltimore County, Cyber Defense Lab;University of Maryland Baltimore County, Cyber Defense Lab;Hammond High School, Columbia, MD;Johns Hopkins University, Applied Physics Laboratory

  • Venue:
  • TRUST'11 Proceedings of the 4th international conference on Trust and trustworthy computing
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

We present a Trusted Platform Module (TPM) application protocol that detects a certain man in the middle attack where an adversary captures and replaces a legitimate computing platform with an imposter that forwards platform authentication challenges to the captive over a high speed data link. This revised Cuckoo attack allows the imposter to satisfy a user's query of platform integrity, tricking the user into divulging sensitive information to the imposter. Our protocol uses an ordinary smart card to verify the platform boot integrity through TPM quote requests, and to verify TPM proximity by measuring TPM tickstamp times required to answer the quotes. Quotes not answered in an expected amount of time may indicate the presence of an imposter's data link, revealing the Cuckoo attack. We describe a timing model for the Cuckoo attack, and summarize experimental results that demonstrate the feasibility of using timing to detect the Cuckoo attack over practical levels of adversary link speeds.