TY - GEN
T1 - Remote Attestation of Software and Execution-Environment in Modern Machines
AU - Kiperberg, Michael
AU - Resh, Amit
AU - Zaidenberg, Nezer J.
N1 - Publisher Copyright:
© 2015 IEEE.
PY - 2016/1/4
Y1 - 2016/1/4
N2 - The research on network security concentrates mainly on securing the communication channels between two endpoints, which is insufficient if the authenticity of one of the endpoints cannot be determined with certainty. Previously presented methods that allow one endpoint, the authentication authority, to authenticate another remote machine. These methods are inadequate for modern machines that have multiple processors, introduce virtualization extensions, have a greater variety of side effects, and suffer from nondeterminism. This paper addresses the advances of modern machines with respect to the method presented by Kennell. The authors describe how a remote attestation procedure, involving a challenge, needs to be structured in order to provide correct attestation of a remote modern target system.
AB - The research on network security concentrates mainly on securing the communication channels between two endpoints, which is insufficient if the authenticity of one of the endpoints cannot be determined with certainty. Previously presented methods that allow one endpoint, the authentication authority, to authenticate another remote machine. These methods are inadequate for modern machines that have multiple processors, introduce virtualization extensions, have a greater variety of side effects, and suffer from nondeterminism. This paper addresses the advances of modern machines with respect to the method presented by Kennell. The authors describe how a remote attestation procedure, involving a challenge, needs to be structured in order to provide correct attestation of a remote modern target system.
KW - Dynamic Root of Trust
KW - Multicore
KW - Rootkit Detection
KW - Self-checksumming Code
KW - Software-based Root-of-trust
KW - Trusted Computing
KW - Virtualization
UR - http://www.scopus.com/inward/record.url?scp=84962792159&partnerID=8YFLogxK
U2 - 10.1109/CSCloud.2015.52
DO - 10.1109/CSCloud.2015.52
M3 - ???researchoutput.researchoutputtypes.contributiontobookanthology.conference???
AN - SCOPUS:84962792159
T3 - Proceedings - 2nd IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2015 - IEEE International Symposium of Smart Cloud, IEEE SSC 2015
SP - 335
EP - 341
BT - Proceedings - 2nd IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2015 - IEEE International Symposium of Smart Cloud, IEEE SSC 2015
A2 - Zhang, Tao
A2 - Das, Sajal K.
A2 - Zhang, Tao
A2 - Qiu, Meikang
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2nd IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2015
Y2 - 3 November 2015 through 5 November 2015
ER -