Towards usage control models: beyond traditional access control
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
The verification of an industrial payment protocol: the SET purchase phase
Proceedings of the 9th ACM conference on Computer and communications security
CONCUR '96 Proceedings of the 7th International Conference on Concurrency Theory
Property-based attestation for computing platforms: caring about properties, not mechanisms
NSPW '04 Proceedings of the 2004 workshop on New security paradigms
Safety analysis of usage control authorization models
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
PRIMA: policy-reduced integrity measurement architecture
Proceedings of the eleventh ACM symposium on Access control models and technologies
Design and implementation of a TCG-based integrity measurement architecture
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
vTPM: virtualizing the trusted platform module
USENIX-SS'06 Proceedings of the 15th conference on USENIX Security Symposium - Volume 15
Linux kernel integrity measurement using contextual inspection
Proceedings of the 2007 ACM workshop on Scalable trusted computing
Model-based behavioral attestation
Proceedings of the 13th ACM symposium on Access control models and technologies
Property-Based TPM Virtualization
ISC '08 Proceedings of the 11th international conference on Information Security
When good instructions go bad: generalizing return-oriented programming to RISC
Proceedings of the 15th ACM conference on Computer and communications security
Improving the scalability of platform attestation
Proceedings of the 3rd ACM workshop on Scalable trusted computing
Remote attestation on program execution
Proceedings of the 3rd ACM workshop on Scalable trusted computing
Improving coherency of runtime integrity measurement
Proceedings of the 3rd ACM workshop on Scalable trusted computing
Behavioral attestation for web services (BA4WS)
Proceedings of the 2008 ACM workshop on Secure web services
Remote Attestation of Attribute Updates and Information Flows in a UCON System
Trust '09 Proceedings of the 2nd International Conference on Trusted Computing
Trustable Remote Verification of Web Services
Trust '09 Proceedings of the 2nd International Conference on Trusted Computing
Trustworthy Log Reconciliation for Distributed Virtual Organisations
Trust '09 Proceedings of the 2nd International Conference on Trusted Computing
Design and implementation of an efficient framework for behaviour attestation using n-call slides
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication
Hi-index | 0.00 |
Assurance of fulfillment of stakeholder's expectations on a target platform is termed as remote attestation. Without such an assurance, there is no way of knowing whether the policies of the remote owner will be enforced as expected. Existing approaches toward remote attestation work at different levels of the software stack and most of them only measure binary hashes of the applications on the remote platform. Several dynamic attestation techniques have been proposed that aim to measure the internal working of an application. As there can be more than one application running on a target system, we need to have mechanisms to remotely certify the internal behavior of multiple applications on a single system. Similarly in TCG-based attestations we use Platform Configuration Register (PCR) for storing and advocating the platform configuration to the remote party. Currently a single PCR is used to capture the behavior of one application/purpose. In this paper we propose the idea of using a single PCR for multiple instances of a target application, while preserving the privacy of other application instances. Moreover, our technique also keeps the trusted status of each application intact. We propose a protocol for measurement and verification of a single instance by its respective stakeholder. Further, the mechanism proposed in this paper can be applied to different attestation techniques that work at different levels of the software stack. We develop a proof-of-concept implementation of our idea and provide future implications of this research.