Property-based attestation for computing platforms: caring about properties, not mechanisms
NSPW '04 Proceedings of the 2004 workshop on New security paradigms
A protocol for property-based attestation
Proceedings of the first ACM workshop on Scalable trusted computing
Design and implementation of a TCG-based integrity measurement architecture
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
On cellular botnets: measuring the impact of malicious devices on a cellular network core
Proceedings of the 16th ACM conference on Computer and communications security
Detecting node compromise in hybrid wireless sensor networks using attestation techniques
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
A Secure Access Approach of UMTS Terminal Based on Trusted Computing
NSWCTC '10 Proceedings of the 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing - Volume 02
Beyond kernel-level integrity measurement: enabling remote attestation for the android platform
TRUST'10 Proceedings of the 3rd international conference on Trust and trustworthy computing
SMS of death: from analyzing to attacking mobile phones on a large scale
SEC'11 Proceedings of the 20th USENIX conference on Security
Hi-index | 0.00 |
Distributed denial of service (DDoS) attacks from a large number of compromised mobile devices are a major threat to mobile networks. In this paper, we present a concept, an architecture, and a protocol for a hardware-based attestation which enables mobile devices to efficiently prove that their baseband stack is still trustworthy. Our attestation mechanism enables verification of the baseband stack without using expensive asymmetric cryptographic operations, maintains the ability to update (or recover) the baseband binary, and allows the network to enforce a certain version, state, or configuration of the baseband at network connect. Our approach represents an efficient method to block devices with a compromised baseband stack and thus prevents distributed denial of service attacks to mobile networks.