Secure Remote Attestation with Strong Key Insulation Guarantees

نویسندگان

چکیده

Secure processors with hardware-enforced isolation are crucial for secure cloud computation. However, commercial have underestimated the capabilities of attackers and failed to provide execution environments capable protecting sensitive information against side-channel attacks. Remote Attestation protocols based on traditional signature schemes not under attacks anymore since their secret keys can be leaked. Previously, Key-Insulated Schemes (KIS) been introduced mitigate damage caused by key exposure in cryptosystems breaking lifetime into independent sessions. KIS protect security all other sessions if any session compromised, however, no guarantees a compromised session. We introduce new cryptographic primitive called One-Time Signature Secret Key Exposure (OTS-SKE), which ensures one forge valid message or nonce even OTS-SKE enables us sign attestation reports securely powerful adversary who observe digital states enclaves through also minimize trusted computing base introducing co-processor that is only responsible generation system. Our experiments show signing faster than as well Elliptic Curve Digital Algorithm (ECDSA) used Intel SGX.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards Provably-Secure Remote Memory Attestation

We initiate the study of provably secure remote memory attestation. We present two protocols offering various efficiency and security trade-offs that detect the presence of injected malicious code in remotelystored heap memory. While our solutions offer protection only against a specific class of attacks, our novel formal security definitions are general enough to cover a wide range of attacks ...

متن کامل

An Enhanced Remote Authentication Scheme using Secure Key Exchange Protocol with Platform Integrity Attestation

Most remote authentication schemes use key exchange protocol to provide secure communication over an untrusted network. The protocol enables remote client and host to authenticate each other and communicate securely with prearranged shared secret key or server secret key. Many remote services environment such as online banking and electronic commerce are dependent on remote authentication schem...

متن کامل

Provably-Secure Remote Memory Attestation for Heap Overflow Protection

Memory corruption attacks may lead to complete takeover of systems. There are numerous works offering protection mechanisms for this important problem. But the security guarantees that are offered by most works are only heuristic and, furthermore, most solutions are designed for protecting the local memory. In this paper we initiate the study of provably secure remote memory attestation; we con...

متن کامل

Improving storage bandwidth guarantees with performance insulation

Workloads that share a storage system should achieve predictable, controllable performance despite the activities of other workloads. One desirable way of expressing performance goals is as bandwidth guarantees. Unfortunately, storage bandwidth is difficult to allocate and manage among workloads, because total system capacity depends on both the workloads’ access patterns and on any interferenc...

متن کامل

Policy Driven Remote Attestation

Increasingly organisations need to exchange and share data amongst their employees as well as with other organisations. This data is often sensitive and/or confidential, and access to it needs to be protected. Architectures to protect disseminated data have been proposed earlier, but absence of a trusted enforcement point on the end-user machine undermines the system security. The reason being,...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Computers

سال: 2023

ISSN: ['1557-9956', '2326-3814', '0018-9340']

DOI: https://doi.org/10.1109/tc.2023.3290870