Remote Attestation of Software and Execution-Environment in Modern Machines

Michael Kiperberg, Amit Resh, Nezer J. Zaidenberg

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

10 Scopus citations

Abstract

The research on network security concentrates mainly on securing the communication channels between two endpoints, which is insufficient if the authenticity of one of the endpoints cannot be determined with certainty. Previously presented methods that allow one endpoint, the authentication authority, to authenticate another remote machine. These methods are inadequate for modern machines that have multiple processors, introduce virtualization extensions, have a greater variety of side effects, and suffer from nondeterminism. This paper addresses the advances of modern machines with respect to the method presented by Kennell. The authors describe how a remote attestation procedure, involving a challenge, needs to be structured in order to provide correct attestation of a remote modern target system.

Original languageEnglish
Title of host publicationProceedings - 2nd IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2015 - IEEE International Symposium of Smart Cloud, IEEE SSC 2015
EditorsTao Zhang, Sajal K. Das, Tao Zhang, Meikang Qiu
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages335-341
Number of pages7
ISBN (Electronic)9781467392990
DOIs
StatePublished - 4 Jan 2016
Externally publishedYes
Event2nd IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2015 - New York, United States
Duration: 3 Nov 20155 Nov 2015

Publication series

NameProceedings - 2nd IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2015 - IEEE International Symposium of Smart Cloud, IEEE SSC 2015

Conference

Conference2nd IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2015
Country/TerritoryUnited States
CityNew York
Period3/11/155/11/15

Keywords

  • Dynamic Root of Trust
  • Multicore
  • Rootkit Detection
  • Self-checksumming Code
  • Software-based Root-of-trust
  • Trusted Computing
  • Virtualization

Fingerprint

Dive into the research topics of 'Remote Attestation of Software and Execution-Environment in Modern Machines'. Together they form a unique fingerprint.

Cite this