Abstract
In the realm of Trusted Computing for embedded systems, ensuring the integrity of both firmware and hardware presents a complex challenge. Traditional approaches have focused on detecting firmware and operating system (OS) software manipulations, leaving a gap in the identification of subtle hardware modifications and attacks. This paper extends previous work on hardware fingerprinting for remote attestation by conducting and analyzing comprehensive long-term hardware measurements. Building upon the established methodology, we examine the correlation between environmental parameters and analog-to-digital converter (ADC) values to gain suitable reference values for remote attestation procedures. Our work introduces significant contributions: the implementation of two distinct test setups for enhanced hardware fingerprinting, a rigorous evaluation of these measurements to identify strong correlations, the development of a standardized log format for hardware measurements aimed at adoption by the Trusted Computing Group (TCG), and the application to Trusted Platform Module TPM based measured boot and remote attestation. In summary, we integrate hardware manipulation detection with the TPM, and lay the groundwork for a more secure and reliable computing environment in embedded systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Birkholz, H., Eckel, M., Pan, W., Voit, E.: Reference Interaction Models for Remote Attestation Procedures. I-D (2023). https://datatracker.ietf.org/doc/draft-ietf-rats-reference-interaction-models/
Birkholz, H., Thaler, D., Richardson, M., Smith, N., Pan, W.: Remote ATtestation procedureS (RATS) Architecture. RFC 9334 (2023). https://doi.org/10.17487/RFC9334. https://www.rfc-editor.org/rfc/rfc9334
Birkholz, H., Vigano, C., Bormann, C.: Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures. RFC 8610 (2019). https://doi.org/10.17487/RFC8610. https://www.rfc-editor.org/rfc/rfc8610
Bormann, C., Gamari, B., Birkholz, H.: Concise Binary Object Representation (CBOR) Tags for Time, Duration, and Period. I-D (2023). https://datatracker.ietf.org/doc/draft-ietf-cbor-time-tag/
Bormann, C., Hoffman, P.E.: Concise Binary Object Representation (CBOR). RFC 7049 (2013). https://doi.org/10.17487/RFC7049. https://www.rfc-editor.org/rfc/rfc7049
Jäger, L., Lorych, D.: Remote attestation extended to the analog domain. In: Proceedings of the 16th International Conference on Availability, Reliability and Security, ARES 2021. Association for Computing Machinery, New York (2021). https://doi.org/10.1145/3465481.3465762
Trusted Computing Group (TCG): Trusted Platform Module Library – Part 1: Architecture, family 2.0, level 00, revision 01.59 edn. (2019). https://trustedcomputinggroup.org/resource/tpm-library-specification/
Trusted Computing Group (TCG): Canonical Event Log Format, version: 1.0, revision: 0.41 edn. (2022). https://trustedcomputinggroup.org/resource/canonical-event-log-format/
Trusted Computing Group (TCG): TCG PC Client Specific Platform Firmware Profile Specification, level 00 version 1.06 revision 52 edn. (2023). https://trustedcomputinggroup.org/resource/pc-client-specific-platform-firmware-profile-specification/
Acknowledgments
This research work was supported by the National Research Center for Applied Cybersecurity ATHENE as well as the projects VE-ASCOT (ID 16ME0274), TRUSTnet (ID 16KIS1787), and FINESSE (ID 16KIS1586) from the German Federal Ministry of Education and Research.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 IFIP International Federation for Information Processing
About this paper
Cite this paper
Eckel, M., Fenzl, F., Jäger, L. (2024). Towards Practical Hardware Fingerprinting for Remote Attestation. In: Pitropakis, N., Katsikas, S., Furnell, S., Markantonakis, K. (eds) ICT Systems Security and Privacy Protection. SEC 2024. IFIP Advances in Information and Communication Technology, vol 710. Springer, Cham. https://doi.org/10.1007/978-3-031-65175-5_8
Download citation
DOI: https://doi.org/10.1007/978-3-031-65175-5_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-65174-8
Online ISBN: 978-3-031-65175-5
eBook Packages: Computer ScienceComputer Science (R0)