Abstract
Trusted computing attestation mechanism relies on hash measurements to realize remote party attestation in distributed systems. Property based attestation enables more meaningful attestation by abstracting low level binary values to high level security properties or functions of systems. The contribution of this paper is two fold. In the first part of the paper, we provide an analysis of the different types of property based attestation mechanisms that have been proposed in the recent years. We categorize these mechanisms as derivation based, delegation based and enforcement based and analyze each of them with a particular focus on their limitations. In the second part, we provide a list of challenges for property based attestation. We believe this to be an useful exercise to help better understand the issues that limit the practical applicability of property based attestation in real world systems.
Original language | English |
---|---|
Title of host publication | Network and System Security, NSS 2009 |
Place of Publication | Pistacaway, NJ |
Publisher | Institute of Electrical and Electronics Engineers (IEEE) |
Pages | 278-285 |
Number of pages | 8 |
ISBN (Electronic) | 9780769538389 |
ISBN (Print) | 9781424450879 |
DOIs | |
Publication status | Published - 2009 |
Event | 2009 3rd International Conference on Network and System Security, NSS 2009 - Gold Coast, QLD, Australia Duration: 19 Oct 2009 → 21 Oct 2009 |
Other
Other | 2009 3rd International Conference on Network and System Security, NSS 2009 |
---|---|
Country/Territory | Australia |
City | Gold Coast, QLD |
Period | 19/10/09 → 21/10/09 |