Skip to main content

Policy-Based Implicit Attestation for Microkernel-Based Virtualized Systems

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9866))

Abstract

We present an attestation mechanism that enables a remote verifier to implicitly evaluate the trustworthiness of the prover’s system through policies. Those policies are verified and enforced by a TPM 2.0, when the attestor interacts with a virtualized hardware component of the prover’s system. For instance, when the verifier reads a virtualized sensor device and requests integrity-protected sensor data, such as the average temperature, a heartbeat value, or an anomaly detection score, the prover’s TPM, which acts as a trust anchor, checks and enforces the policies specified by the verifier. The prover, in turn, is also able to define policies, which can limit access to certain hardware components and are also enforced by the TPM. As a result, both parties have to cooperate for a successful attestation, which implicitly creates verifiable proof of the prover’s trustworthiness using mainly symmetric instead of expensive asymmetric cryptographic operations like digital signatures.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Alsouri, S., Dagdelen, Ö., Katzenbeisser, S.: Group-based attestation: enhancing privacy and management in remote attestation. In: Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. LNCS, vol. 6101, pp. 63–77. Springer, Heidelberg (2010)

    Google Scholar 

  2. Andersen, E., Landley, R., Vlasenko, D., et al.: Busybox. https://busybox.net

  3. ARM Ltd.: Virtualization extensions architecture specification (2010). http://infocenter.arm.com

  4. ARM Ltd.: ARM Cortex-A15 technical reference manual. ARM DDI 0438C, September 2011

    Google Scholar 

  5. ARM Ltd.: ARM architecture reference manual. ARMv7-A and ARMv7-R edition. ARM DDI 0406C.b, July 2012

    Google Scholar 

  6. Brickell, E., Camenisch, J., Chen, L.: Direct anonymous attestation. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, pp. 132–145. ACM, New York (2004). http://doi.acm.org/10.1145/1030083.1030103

  7. Danial, A.: CLOC - Count Lines of Code. Version 1.67. https://github.com/AlDanial/cloc

  8. Haldar, V., Chandra, D., Franz, M.: Semantic remote attestation: a virtual machine directed approach to trusted computing. In: Proceedings of the 3rd Conference on Virtual Machine Research and Technology Symposium, Berkeley, CA, USA (2004)

    Google Scholar 

  9. Krawczyk, H., Rabin, T.: Chameleon hashing and signatures. IACR Cryptology ePrint Archive (1998)

    Google Scholar 

  10. Genode Labs. http://www.genode.org

  11. Liedtke, J.: Microkernels must and can be small. In: Proceedings of the 5th IEEE International Workshop on Object-Orientation in Operating Systems (IWOOOS). Seattle, WA, October 1996. http://l4ka.org/publications/

  12. Neiger, G., Santoni, A., Leung, F., Rodgers, D., Uhlig, R.: Intel virtualization technology: hardware support for efficient processor virtualization. Intel Technol. J. 10(3), 167–177 (2006)

    Article  Google Scholar 

  13. Sadeghi, A.R., Stüble, C.: Property-based attestation for computing platforms: caring about properties, not mechanisms. In: Proceedings of the 2004 Workshop on New Security Paradigms, NSPW 2004, pp. 67–77. ACM, New York (2004)

    Google Scholar 

  14. Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and implementation of a TCG-based integrity measurement architecture. In: Proceedings of the 13th Conference on USENIX Security Symposium, vol. 13, Berkeley, CA, USA (2004)

    Google Scholar 

  15. Sirer, E.G., de Bruijn, W., Reynolds, P., Shieh, A., Walsh, K., Williams, D., Schneider, F.B.: Logical attestation: an authorization architecture for trustworthy computing. In: Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, SOSP 2011, pp. 249–264. ACM, New York (2011)

    Google Scholar 

  16. Trusted Computing Group (TCG): TPM Main Specification Version 1.2 rev. 116. http://www.trustedcomputinggroup.org/resources/tpm_main_specification

  17. Trusted Computing Group (TCG): Trusted Platform Module Library Specification. Family “2.0". Level 00, Revision 01.16. http://www.trustedcomputinggroup.org/resources/tpm_library_specification

  18. TU Dresden OS Group: L4/Fiasco.OC. http://os.inf.tu-dresden.de/fiasco/

  19. Wagner, S., Proskurin, S., Bakos, T.: TPM 2.0 Simulator Extraction Script (2016). https://github.com/stwagnr/tpm2simulator

Download references

Acknowledgments

Parts of this work were funded by the Industrial Data Space project (GN: 01IS15054) of the German Federal Ministry of Education and Research. We also like to thank Sergej Proskurin and Tamas Bakos for contributing to our prototype and to the TPM 2.0 Simulator Extraction Script.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Steffen Wagner .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Wagner, S., Eckert, C. (2016). Policy-Based Implicit Attestation for Microkernel-Based Virtualized Systems. In: Bishop, M., Nascimento, A. (eds) Information Security. ISC 2016. Lecture Notes in Computer Science(), vol 9866. Springer, Cham. https://doi.org/10.1007/978-3-319-45871-7_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-45871-7_19

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-45870-0

  • Online ISBN: 978-3-319-45871-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics