One of the central aims of Trusted Computing is to provide the ability to attest that a remote platform is in a certain trustworthy state. While in principle this functionality can be achieved by the remote attestation process as standardized by the Trusted Computing Group, privacy and scalability problems make it difficult to realize in practice: In particular, the use of the SHA-1 hash to measure system components requires maintenance of a large set of hashes of presumably trustworthy software; furthermore, during attestation, the full configuration of the platform is revealed. In this paper we show how chameleon hashes allow to mitigate of these two problems. By using a prototypical implementation we furthermore show that the approach is...
Abstract. Over the past years, many different approaches and con-cepts in order to increase computer...
With the rapidly evolving next-generation systems- of-systems, we face new security, resilience, and...
Embedded devices are increasingly permeating our environment to collect data and act on the insight ...
One of the central aims of Trusted Computing is to provide the ability to attest that a remote platf...
Trusted computing attestation mechanism relies on hash measurements to realize remote party attestat...
As the complexity of current software systems increases, we see a correlative increase in the number...
As the complexity of current software systems increases, we see a correlative increase in the number...
Abstract. The trusted computing group (TCG) specified two protocols that allow a trusted hardware de...
In recent years, the rapid development of virtualization and container technology brings unprecedent...
The Trusted Computing Group (TCG) proposed remote attestation as a solution for establishing trust a...
This paper describes the direct anonymous attestation scheme (DAA). This scheme was adopted by the T...
International audienceTPM remote attestation allows to verify the integrity of the boot sequence of ...
direct anonymous attestation, DAA, trusted computing, group signatures This paper describes the dire...
Remote attestation of computing platforms, using trusted hardware, guarantees the integrity, and by ...
Remote attestation of computing platforms, using trusted hardware, guarantees the integrity, and by ...
Abstract. Over the past years, many different approaches and con-cepts in order to increase computer...
With the rapidly evolving next-generation systems- of-systems, we face new security, resilience, and...
Embedded devices are increasingly permeating our environment to collect data and act on the insight ...
One of the central aims of Trusted Computing is to provide the ability to attest that a remote platf...
Trusted computing attestation mechanism relies on hash measurements to realize remote party attestat...
As the complexity of current software systems increases, we see a correlative increase in the number...
As the complexity of current software systems increases, we see a correlative increase in the number...
Abstract. The trusted computing group (TCG) specified two protocols that allow a trusted hardware de...
In recent years, the rapid development of virtualization and container technology brings unprecedent...
The Trusted Computing Group (TCG) proposed remote attestation as a solution for establishing trust a...
This paper describes the direct anonymous attestation scheme (DAA). This scheme was adopted by the T...
International audienceTPM remote attestation allows to verify the integrity of the boot sequence of ...
direct anonymous attestation, DAA, trusted computing, group signatures This paper describes the dire...
Remote attestation of computing platforms, using trusted hardware, guarantees the integrity, and by ...
Remote attestation of computing platforms, using trusted hardware, guarantees the integrity, and by ...
Abstract. Over the past years, many different approaches and con-cepts in order to increase computer...
With the rapidly evolving next-generation systems- of-systems, we face new security, resilience, and...
Embedded devices are increasingly permeating our environment to collect data and act on the insight ...