Automated Verification of Dynamic Root of Trust Protocols

From MaRDI portal
Publication:3304809

DOI10.1007/978-3-662-54455-6_5zbMATH Open1444.68037arXiv1701.08676OpenAlexW3124484319MaRDI QIDQ3304809FDOQ3304809


Authors: Sergiu Bursuc, Christian Johansen, Shiwei Xu Edit this on Wikidata


Publication date: 3 August 2020

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Abstract: Automated verification of security protocols based on dynamic root of trust, typically relying on protected hardware such as TPM, involves several challenges that we address in this paper. We model the semantics of trusted computing platforms (including CPU, TPM, OS, and other essential components) and of associated protocols in a classical process calculus accepted by ProVerif. As part of the formalization effort, we introduce new equational theories for representing TPM specific platform states and dynamically loaded programs. Formal models for such an extensive set of features cannot be readily handled by ProVerif, due especially to the search space generated by unbounded extensions of TPM registers. In this context we introduce a transformation of the TPM process, that simplifies the structure of the search space for automated verification, while preserving the security properties of interest. This allows to run ProVerif on our proposed models, so we can derive automatically security guarantees for protocols running in a dynamic root of trust context.


Full work available at URL: https://arxiv.org/abs/1701.08676




Recommendations



Cites Work


Cited In (3)

Uses Software





This page was built for publication: Automated Verification of Dynamic Root of Trust Protocols

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3304809)