Skip to main content

Establishing Software-Only Root of Trust on Embedded Systems: Facts and Fiction (Transcript of Discussion)

  • Conference paper
  • First Online:
Security Protocols XXIII (Security Protocols 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9379))

Included in the following conference series:

  • 803 Accesses

Abstract

This presentation is based on joint work with Yanlin Li, Yueqiang Cheng, and Adrian Perrig.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gasser, M., Goldstein, A., Kaufman, C., Lampson, B.: The Digital distributed system security architecture. In: Proceedings of the National Computer Security Conference, Baltimore, MD (1989)

    Google Scholar 

  2. Lampson, B., Abadi, M., Burrows, M., Wobber, E.: Authentication inn distributed systems: theory and practice. ACM Trans. Comput. Syst. 10(4), 265–310 (1992)

    Article  Google Scholar 

  3. Zhao, J., Gligor, V., Perrig, A., Newsome, J.: ReDABLS: revisiting device attestation with bounded leakage of secrets. In: Christianson, B., Malcolm, J., Stajano, F., Anderson, J., Bonneau, J. (eds.) Security Protocols 2013. LNCS, vol. 8263, pp. 94–114. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  4. Armknecht, F., Sadeghi, A.-R., Schultz, S., Wachsman, C.: A security framework for the analysis and design of software attestation. In: Proceedings of the 2013 ACM Conference on Computer and Communications Security. ACM (2013)

    Google Scholar 

  5. Li, Y., Mccune, J.M., Perrig, A.: VIPER: verifying the integrity of PERipherals firmware. In: Proceedings of the 18th ACM Conference on Computer and Communications Security. ACM Press (2011)

    Google Scholar 

  6. Klimov, A., Shamir, A.: A new class of invertible mappings. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  7. Butterworth, J., Kallenberg, C., Kovah, X., Hertzog, A.: BIOS Chronomancy: fixing the core root of trust for measurement. In: Proceedings of the 2013 ACM Conference on Computer and Communications Security. ACM (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Virgil Gligor .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Gligor, V. (2015). Establishing Software-Only Root of Trust on Embedded Systems: Facts and Fiction (Transcript of Discussion). In: Christianson, B., Švenda, P., Matyáš, V., Malcolm, J., Stajano, F., Anderson, J. (eds) Security Protocols XXIII. Security Protocols 2015. Lecture Notes in Computer Science(), vol 9379. Springer, Cham. https://doi.org/10.1007/978-3-319-26096-9_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-26096-9_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-26095-2

  • Online ISBN: 978-3-319-26096-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics