Property based attestation and trusted computing: Analysis and challenges

Aarthi Nagarajan*, Vijay Varadharajan, Michael Hitchens, Eimear Gallery

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

27 Citations (Scopus)

Abstract

Trusted computing attestation mechanism relies on hash measurements to realize remote party attestation in distributed systems. Property based attestation enables more meaningful attestation by abstracting low level binary values to high level security properties or functions of systems. The contribution of this paper is two fold. In the first part of the paper, we provide an analysis of the different types of property based attestation mechanisms that have been proposed in the recent years. We categorize these mechanisms as derivation based, delegation based and enforcement based and analyze each of them with a particular focus on their limitations. In the second part, we provide a list of challenges for property based attestation. We believe this to be an useful exercise to help better understand the issues that limit the practical applicability of property based attestation in real world systems.

Original languageEnglish
Title of host publicationNetwork and System Security, NSS 2009
Place of PublicationPistacaway, NJ
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages278-285
Number of pages8
ISBN (Electronic)9780769538389
ISBN (Print)9781424450879
DOIs
Publication statusPublished - 2009
Event2009 3rd International Conference on Network and System Security, NSS 2009 - Gold Coast, QLD, Australia
Duration: 19 Oct 200921 Oct 2009

Other

Other2009 3rd International Conference on Network and System Security, NSS 2009
CountryAustralia
CityGold Coast, QLD
Period19/10/0921/10/09

Fingerprint Dive into the research topics of 'Property based attestation and trusted computing: Analysis and challenges'. Together they form a unique fingerprint.

Cite this