Advertisement

Mobile Trusted Agent (MTA): Build User-Based Trust for General-Purpose Computer Platform

  • Wei Feng
  • Yu Qin
  • Dengguo Feng
  • Ge Wei
  • Lihui Xue
  • Dexian Chang
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7873)

Abstract

Trusted computing technology can establish trust in the local computer platform by a trusted boot, and can further transfer the trust to a remote verifier through a remote attestation mechanism. However, no standard solution is provided to convey the trust information to users in a friendly manner. Existing methods have no implementation, or need users to buy a specific USB device (an additional purchasing burden for users). To establish user-based trust, we summarize possible solutions and classify the related works according to each solution. After comparing these solutions, we provide a better method “Mobile Trusted Agent (MTA)”, which uses a general mobile device as a reliable medium to establish a secure channel between the local user and the remote verifier. Finally, we have implemented MTA using an ARM SoC device and evaluated the performance of the protocol for secure channel. The evaluation results demonstrate that MTA has high quality and flexibility for building user-based trust.

Keywords

Trusted Computing Remote Attestation User-Based Trust Mobile device ARM 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Trusted Computing Group. Trusted platform module main specification. Version 1.2, Revision 103 (2007)Google Scholar
  2. 2.
    State Cryptography Administration. Functionality and Interface Specification of Cryptographic Support Platform for Trusted Computing (2007)Google Scholar
  3. 3.
    Ryan, M.: Introduction to the TPM 1.2 (March 24, 2009)Google Scholar
  4. 4.
    McCune, J.M., Perrig, A., Seshadri, A., van Doorn, L.: Turtles All The Way Down: Research Challenges in User-Based Attestation. In: Proceedings of the 2nd USENIX Workshop on Hot Topics in Security. USENIX, Boston (2007)Google Scholar
  5. 5.
    Parno, B.: Bootstrapping Trust in a “Trusted” Platform. In: Proceedings of the 3rd USENIX Workshop on Hot Topics in Security, San Jose, CA (July 29, 2008)Google Scholar
  6. 6.
    Parno, B., McCune, J.M., Perrig, A.: Bootstrapping Trust in Commodity Computers. In: Proceedings of the IEEE Symposium on Security and Privacy (May 2010)Google Scholar
  7. 7.
    Vasudevan, A., Parno, B., Qu, N., Gligor, V., Perrig, A.: Lockdown: A Safe and Practical Environment for Security Applications, CMU-CyLab-09-011 (2009)Google Scholar
  8. 8.
    Sparks, E.R.: A security assessment of trusted platform modules. Technical Report TR2007-597, Dartmouth College (2007)Google Scholar
  9. 9.
    Zhang, D., Han, Z., Yan, G.: A Portable TPM Based on USB Key. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, New York, NY, USA (2010)Google Scholar
  10. 10.
    Han, L., Liu, J., Zhang, D.: A Portable TPM Scheme for General-purpose Trusted Computing Based on EFI. In: International Conference on Multimedia Information Networking and Security. IEEE, Wuhan (2009)Google Scholar
  11. 11.
    Keller, E., Szefer, J., Rexford, J., Lee, R.B.: NoHype: Virtualized cloud infrastructure without the virtualization. In: Proc. International Symposium on Computer Architecture (June 2010)Google Scholar
  12. 12.
    McCune, J.M., Parno, B., Perrig, A., Reiter, M.K., Isozaki, H.: Flicker: An Execution Infrastructure for TCB Minimization. In: Proceedings of the ACM European Conference on Computer Systems, Glasgow, Scotland (2008)Google Scholar
  13. 13.
    McCune, J.M., Li, Y., Qu, N., Zhou, Z., Datta, A., Gligor, V., Perrig, A.: TrustVisor: Efficient TCB Reduction and Attestation. In: IEEE Symposium on Security and Privacy (2010)Google Scholar
  14. 14.
    Advanced Micro Devices. AMD64 architecture programmer’ manual. System programming, vol. 2. AMD Publication no. 24593 rev.3.14 (September 2007)Google Scholar
  15. 15.
    Intel Corporation. Intel trusted execution technology-software development guide. Document number 315168-005 (June 2008)Google Scholar
  16. 16.
    Aaraj, N., Raghunathan, A., Jha, N.K.: Analysis and design of a hardware/software trusted platform module for embedded systems. ACM Transactions on Embedded Computing Systems 8(1), 1–31 (2008)CrossRefGoogle Scholar
  17. 17.
    Aaraj, N., Raghunathan, A., Ravi, S., Jha, A.K.: Energy and Execution Time Analysis of a Software-based Trusted Platform Module. In: Proceedings of the Conference on Design, Automation and Test in Europe. IEEE (2007)Google Scholar
  18. 18.
    Strasser, M.: TPM Emulator, http://tpm-emulator.berlios.de
  19. 19.
    Software TPM Introduction (IBM), http://ibmswtpm.sourceforge.net
  20. 20.
  21. 21.
  22. 22.
    Dietrich, K., Winter, J.: Implementation Aspects of Mobile and Embedded Trusted Computing. In: Proceedings of the 2nd International Conference on Trusted Computing, Oxford, UK, April 06-08 (2009)Google Scholar
  23. 23.
    Hein, D.M., Toegl, R., Pirker, M., Gatial, E., Balogh, Z., Brandl, H., Hluchy, L.: Securing mobile agents for crisis management support. In: STC 2012: Proceedings of the Seventh ACM Workshop on Scalable Trusted Computing, pp. 85–90. ACM, New York (2012)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Wei Feng
    • 1
  • Yu Qin
    • 1
  • Dengguo Feng
    • 1
  • Ge Wei
    • 2
  • Lihui Xue
    • 2
  • Dexian Chang
    • 1
  1. 1.Institute of SoftwareChinese Academy of SciencesChina
  2. 2.GUANGDONG KAMFU Information & Technology CO., LTDChina

Personalised recommendations