skip to main content
10.1145/3317549.3323403acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
research-article

Advancing remote attestation via computer-aided formal verification of designs and synthesis of executables: opinion

Published: 15 May 2019 Publication History

Abstract

Remote Attestation (RA) of embedded/smart/IoT devices is a very important issue on today's security landscape. RA enables a verifier to measures the current internal memory state of an untrusted remote device (prover). RA helps the verifier establish a static or dynamic root of trust in prover. Despite much prior work, state-of-the-art RA techniques unfortunately still lack any solid foundation and offer no ironclad security, safety or robustness guarantees. This paper argues that <u>computer-aided formal verification</u>, and synthesis of executables, of RA protocols and hybrid (software-hardware) architectures is required and currently unaddressed. We believe that this is achievable with current (computer-aided) formal methods frameworks and tools, and that this can help advance and mature RA research if used to establish more rigorous and clear security arguments. To support our opinion, we highlight several examples where subtle issues were missed in the design and security analysis of RA techniques. Despite deceptive simplicity of such protocols, manual analyses and ad hoc implementations often lead to over-simplification of (and subsequent glossing over) important details in the underlying processor and system architectures. Computer-aided formal verification forces a more scrupulous and disciplined consideration of such details, since, otherwise, verification simply fails. The key objective of the research direction we propose is to increase confidence in correctness and security guarantees of current and future RA techniques and their implementations.

References

[1]
The coq proof assistant. https://coq.inria.fr/.
[2]
Easycrypt: Computer-aided cryptographic proofs. https://www.easycrypt.info/trac/.
[3]
Pvs specification and verification system. http://pvs.csl.sri.com/.
[4]
Tigist Abera, N. Asokan, Lucas Davi, Farinaz Koushanfar, Andrew Paverd, Ahmad-Reza Sadeghi, and Gene Tsudik. Invited - things, trouble, trust: on building trust in iot systems. In Proceedings of the 53rd Annual Design Automation Conference, DAC 2016, Austin, TX, USA, June 5--9, 2016, pages 121:1--121:6, 2016.
[5]
José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir, Benjamin Grégoire, Vincent Laporte, and Vitor Pereira. A fast and verified software stack for secure function evaluation. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS '17, pages 1989--2006, New York, NY, USA, 2017. ACM.
[6]
Arm Ltd. Arm TrustZone, 2018.
[7]
Ferdinand Brasser, Brahim El Mahjoub, Ahmad-Reza Sadeghi, Christian Wachsmann, and Patrick Koeberl. TyTAN: tiny trust anchor for tiny devices. In DAC. ACM.
[8]
Xavier Carpent, Karim Eldefrawy, Norrathep Rattanavipanon, and Gene Tsudik. Temporal consistency of integrity-ensuring computations and applications to embedded systems security. In Proceedings of the 2018 on Asia Conference on Computer and Communications Security, ASIACCS '18, pages 313--327, New York, NY, USA, 2018. ACM.
[9]
Lucas Davi, Ahmad-Reza Sadeghi, and Marcel Winandy. Dynamic integrity measurement and attestation: Towards defense against return-oriented programming attacks. In Proceedings of the 2009 ACM Workshop on Scalable Trusted Computing, STC '09, pages 49--54, New York, NY, USA, 2009. ACM.
[10]
Karim Eldefrawy, Ivan Oliveira Nunes, Norrathep Rattanavipanon, Michael Steiner, and Gene Tsudik. Formally verified hardware/software co-design for remote attestation. CoRR, abs/1811.00175, 2018.
[11]
Karim Eldefrawy, Norrathep Rattanavipanon, and Gene Tsudik. HYDRA: hybrid design for remote attestation (using a formally verified microkernel). In Wisec. ACM, 2017.
[12]
Karim Eldefrawy, Gene Tsudik, Aurélien Francillon, and Daniele Perito. SMART: Secure and minimal architecture for (establishing dynamic) root of trust. In NDSS. Internet Society, 2012.
[13]
A. Francillon, Q. Nguyen, K. B. Rasmussen, and G. Tsudik. A minimalist approach to remote attestation. In 2014 Design, Automation Test in Europe Conference Exhibition (DATE), pages 1--6, March 2014.
[14]
SANS Institute. Securing the internet of things survey. https://www.sans.org/reading-room/whitepapers/analyst/securing-internet-things-survey-34785, 2014.
[15]
Intel. Intel Software Guard Extensions (Intel SGX).
[16]
Gerwin Klein, Kevin Elphinstone, Gernot Heiser, June Andronick, David Cock, Philip Derrin, Dhammika Elkaduwe, Kai Engelhardt, Rafal Kolanski, Michael Norrish, Thomas Sewell, Harvey Tuch, and Simon Winwood. seL4: Formal verification of an OS kernel. In Proceedings of the ACM SIGOPS 22Nd Symposium on Operating Systems Principles, SOSP '09, pages 207--220, New York, NY, USA, 2009. ACM.
[17]
Patrick Koeberl, Steffen Schulz, Ahmad-Reza Sadeghi, and Vijay Varadharajan. TrustLite: A security architecture for tiny embedded devices. In EuroSys. ACM, 2014.
[18]
Xeno Kovah, Corey Kallenberg, Chris Weathers, Amy Herzog, Matthew Albin, and John Butterworth. New results for timing-based attestation. In Proceedings of the IEEE Symposium on Research in Security and Privacy. IEEE Computer Society Press, 2012.
[19]
C. Landwehr, D. Boneh, J. C. Mitchell, S. M. Bellovin, S. Landau, and M. E. Lesk. Privacy and cybersecurity: The next 100 years. Proceedings of the IEEE, 100 (Special Centennial Issue):1659--1673, May 2012.
[20]
Ralph Langner. To kill a centrifuge a technical analysis of what Stuxnet's creators tried to achieve, 2013.
[21]
Yanlin Li, Yueqiang Cheng, Virgil Gligor, and Adrian Perrig. Establishing software-only root of trust on embedded systems: Facts and fiction. In Security Protocols---22nd International Workshop, 2015.
[22]
Yanlin Li, Jonathan M. McCune, and Adrian Perrig. Viper: Verifying the integrity of peripherals' firmware. In CCS. ACM, 2011.
[23]
Wired Magazine. The botnet that broke the internet isn't going away. https://www.wired.com/2016/12/botnet-broke-internet-isnt-going-away/, 2016.
[24]
Daniele Perito and Gene Tsudik. Secure code update for embedded devices via proofs of secure erasure. In ESORICS, 2010.
[25]
Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert van Doorn, and Pradeep Khosla. Scuba: Secure code update by attestation in sensor networks. In ACM workshop on Wireless security, 2006.
[26]
Arvind Seshadri, Mark Luk, Elaine Shi, Adrian Perrig, Leendert van Doorn, and Pradeep Khosla. Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems. ACM SIGOPS Operating Systems Review, December 2005.
[27]
IEEE Spectrum. The real story of Stuxnet. http://spectrum.ieee.org/telecom/security/the-real-story-of-stuxnet, 2013.
[28]
S. Zeitouni, G. Dessouky, O. Arias, D. Sullivan, A. Ibrahim, Y. Jin, and A. Sadeghi. Atrium: Runtime attestation resilient under memory attacks. In 2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pages 384--391, Nov 2017.
[29]
Jean-Karim Zinzindohoué, Karthikeyan Bhargavan, Jonathan Protzenko, and Benjamin Beurdouche. Hacl<sup>*</sup>: A verified modern cryptographic library. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS '17, pages 1789--1806, New York, NY, USA, 2017. ACM.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WiSec '19: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks
May 2019
359 pages
ISBN:9781450367264
DOI:10.1145/3317549
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 15 May 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. formal methods
  2. formal verification
  3. secure remote attestation

Qualifiers

  • Research-article

Conference

WiSec '19
Sponsor:

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 194
    Total Downloads
  • Downloads (Last 12 months)11
  • Downloads (Last 6 weeks)2
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media