TPM用户密钥命令安全性形式化分析(英文)

来源 :中国通信 | 被引量 : 0次 | 上传用户:wumin6230
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
The Trusted Platform Module (TPM) is a dedicated hardware chip designed to provide a higher level of security for computing platform. All TPM functionalities are implemented in TPM commands to achieve specific security goals. We attempt to analyze the security properties of these commands, especially the key management API. Our study utilizes applied pi calculus to formalize the commands and determine how their security properties affect TPM key management. The attacker is assumed to call TPM commands without bounds and without knowing the TPM root key, expecting to obtain or replace the user key. The analysis goal in our study is to guarantee the corresponding property of API execution and the integrity of API data. We analyze the security properties of TPM commands with a process reduction method, identify the key-handle hijack attack on a TPM newly created key, and propose reasonable solutions to solve the problem. Then, we conduct an experiment involving a key-handle attack, which successfully replaces a user key with an attacker’s key using malicious TPM software. This paper discloses the weakness of the relationship between the key handle and the key object. After the TPM software stack is compromised, the attacker can launch a key-handle attack to obtain the user key and even break into the whole storage tree of user keys. The Trusted Platform Module (TPM) is a dedicated hardware chip designed to provide a higher level of security for computing platform. All TPM functionalities are implemented in TPM commands to achieve specific security goals. We attempt to analyze the security properties of these commands, especially the key management API. Our study receiving applied pi calculus to formalize the commands and determine how their their security properties affect TPM key management. The attacker is assumed to call TPM key management. The attacker is assumed to call TPM key management. user key. The analysis goal in our study is to guarantee the corresponding property of API execution and the integrity of API data. We analyze the security properties of TPM commands with a process reduction method, identify the key-handle hijack attack on a TPM newly created key, and propose reasonable solutions to solve the problem. Then, we conduct an experiment involving a key-handle attack, which successfully replaces a user key with an attacker’s key using malicious TPM software. This paper discloses the weakness of the relationship between the key handle and the key object. After the TPM software stack is compromised, the attacker can launch a key-handle attack to obtain the user key and even break into the whole storage tree of user keys.
其他文献
对于一个城市而言,其竞争力水平的高低与该城市在国内外的前途与地位息息相关,而作为体现城市竞争力最有力的代表,城市基础设施建设至关重要.在我国,随着近年来经济建设步伐
本文介绍了纺织品环保检验标准新旧版本的差异及2000年新版的变化内容.
随着我国高速公路事业的不断发展,公众对于高速公路的质量要求也日益提高,所以采用科学有效的旧桥的加固目标及加固方法已成为时代的要求,本文结合作者多年工作经验阐述的各
1.1区间概况梅村站-上梅林站盾构区间出梅村站东端,上跨广深港客运专线后向东沿梅林路行进,下穿地铁4号线盾构区间隧道,最后到达上梅林站。本区间周围为居民小区,无控制性建筑、
随着建筑行业的快速发展以及科学技术的日新月异,建筑施工技术得到了良好的应用与革新,其中钢结构建筑数量越来越多,而钢结构具有优越的性能,使得人们对钢结构施工技术愈加关
采用外源添加重金属和露天盆栽实验研究了Cd、Ni对含羞草、三叶草根际土壤脲酶、过氧化氢酶和蔗糖酶活性的影响.结果表明,Cd、Ni单一污染条件下,低浓度的Cd、Ni对含羞草组、
期刊
本文研究平衡离子分别为K+和NH4的配合物以及平衡离子为N4+的电子结构,并讲座平衡离子中心原子对配合物的抗肿瘤功效和电子结构的影响.
城建工程施工中,设置后浇带是其施工的重要环节,其设置对混凝土收缩变形、混凝土温度应力等问题的解决具有重要意义.但在城建工程后浇带具体施工过程中,还存有诸多问题,因此
将Tencell纤维融入灯芯绒产品中,可提升传统品种的服用性能和产品档次,本文介绍了Tencell灯芯绒染整工艺流程.