Abstract
We address property-based attestation in the context of an in-vehicle communication system called Terminal Mode that allows mobile devices to “stream” services, such as navigation or music, to car head-units. In Terminal Mode, attestation of the mobile device is needed to enforce driver distraction regulations and traditional binary attestation is not applicable due to frequently needed measurement updates and limited connectivity of car head-units. We present a novel attestation scheme that bootstraps from existing application certification infrastructures available on mobile device platforms, and thus avoids the need to setup and maintain a new service that provides translation from software measurements to properties, and consequently makes realization of property-based attestation economically feasible.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Alam, M., et al.: Model-based behavioral attestation. In: Proc. 13th ACM Symposium on Access Control Models and Technologies (2008)
WiFi Alliance. WiFi protected setup specification v1.0 (2007)
Arbaugh, W., et al.: A secure and reliable bootstrap architecture. In: Proc. IEEE Symposium on Security and Privacy (1997)
ARM. Trustzone-enabled processor, http://www.arm.com/products/processors/technologies/trustzone.php
National Highway Safety Traffic Association. The impact of driver inattention on near-crash/crash risk: An analysis using the 100-car naturalistic driving study data (2006), http://www.nhtsa.gov/DOT/NHTSA/NRD/Multimedia/PDFs/Crash%20Avoidance/2006/DriverInattention.pdf
Brakensiek, J.: Terminal mode technical architecture (2010), http://www.nokia.com/terminalmode
Chen, L., et al.: A protocol for property-based attestation. In: Proc. First ACM Workshop on Scalable Trusted Computing (2006)
Chen, L., et al.: Property-based attestation without a trusted third party. In: Proc. 11th International Conference on Information Security (2008)
Dolev, D., Yao, A.: On the security of public key protocols. Technical report. Stanford University (1981)
UPnP Forum, http://upnp.org/sdcps-and-certification/standards/
Gasmi, Y., et al.: Beyond secure channels. In: Proc. 2nd ACM Workshop on Scalable Trusted (2007)
Goldman, K., et al.: Linking remote attestation to secure tunnel endpoints. In: Proc. 1st ACM Workshop on Scalable Trusted Computing (2006)
Trusted Computing Group. Mobile trusted module specification, version 1.0 (2008)
Haldar, V., et al.: Semantic remote attestation - virtual machine directed approach to trusted computing. In: Virtual Machine Research and Technology Symposium (2004)
Kasatkin, D.: Mobile simplified security framework. In: Proc. 12th Linux Symposium (2010)
Kil, C., et al.: Remote attestation to dynamic system properties: Towards providing complete system integrity evidence. In: Proc. International Conference on Dependable Systems and Networks (2009)
Korthaus, R., et al.: A practical property-based bootstrap architecture. In: Proc. 4th ACM Workshop on Scalable Trusted Computing (2009)
Kostiainen, K., et al.: Old, new, borrowed, blue: A perspective on the evolution of platform security architectures. In: Proc. 1st ACM Conference on Data and Application Security and Privacy (2011)
Kühn, U., et al.: Realizing property-based attestation and sealing with commonly available hard- and software. In: Proc. 2nd ACM Workshop on Scalable Trusted Computing (2007)
Lampson, B., et al.: Authentication in distributed systems: theory and practice. In: Proc. 13th ACM Symposium on Operating Systems Principles (1991)
McCune, J., et al.: Minimal TCB Code Execution (Extended Abstract). In: Proc. IEEE Symposium on Security and Privacy (2007)
Nauman, M., et al.: Beyond kernel-level integrity measurement: Enabling remote attestation for the android platform. In: Proc. International Conference on Trust and Trustworthy Computing (2010)
Poritz, J., et al.: Property attestation scalable and privacy-friendly security assessment of peer computers. Technical Report RZ3548, IBM Research (2004)
Richardson, T.: The rfb protocol (2010), http://www.realvnc.com/docs/rfbproto.pdf
Sadeghi, A.-R., Stüble, C.: Property-based attestation for computing platforms: caring about properties, not mechanisms. In: Proc. Workshop on New Security Paradigms (2004)
Sailer, R., et al.: Design and implementation of a tcg-based integrity measurement architecture. In: Proc. 13th USENIX Security Symposium (2004)
Schulzrinne, H., et al.: RTP: A transport protocol for real-time applications (2003)
Shi, E., et al.: Bind: A fine-grained attestation service for secure distributed systems. In: Proc. IEEE Symposium on Security and Privacy (2005)
Bluetooth SIG. Bluetooth specification version 2.1 + edr (2007)
Srage, J., Azema, J.: M-Shield mobile security technology (2005), TI White paper, http://focus.ti.com/pdfs/wtbu/ti_mshield_whitepaper.pdf
Stumpf, F., et al.: Improving the scalability of platform attestation. In: Proc. 3rd ACM Workshop on Scalable Trusted Computing (2008)
Trusted Platform Module (TPM) Specifications, https://www.trustedcomputinggroup.org/specs/TPM/
International Telecommunications Union. Decreasing driver distraction, itu-t technology watch report (August 2010), http://www.itu.int/dms_pub/itu-t/oth/23/01/T230100000F0001PDFE.pdf
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kostiainen, K., Asokan, N., Ekberg, JE. (2011). Practical Property-Based Attestation on Mobile Devices. In: McCune, J.M., Balacheff, B., Perrig, A., Sadeghi, AR., Sasse, A., Beres, Y. (eds) Trust and Trustworthy Computing. Trust 2011. Lecture Notes in Computer Science, vol 6740. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21599-5_6
Download citation
DOI: https://doi.org/10.1007/978-3-642-21599-5_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-21598-8
Online ISBN: 978-3-642-21599-5
eBook Packages: Computer ScienceComputer Science (R0)