CORC  > 软件研究所  > 软件所图书馆  > 期刊论文
formal analysis of trusted platform module commands for compromising user key
Qin Yu ; Zhao Shijun ; Zhang Qianying
刊名CHINA COMMUNICATIONS
2012
卷号9期号:10页码:91-102
关键词trusted computing TPM TPM command applied pi calculus API analysis
ISSN号1673-5447
中文摘要The Trusted Platform Module (TPM) is a dedicated hardware chip designed to provide a higher level of security for computing platform. All TPM functionalities are implemented in TPM commands to achieve specific security goals. We attempt to analyze the security properties of these commands, especially the key management API. Our study utilizes applied pi calculus to formalize the commands and determine how their security properties affect TPM key management. The attacker is assumed to call TPM commands without bounds and without knowing the TPM root key, expecting to obtain or replace the user key. The analysis goal in our study is to guarantee the corresponding property of API execution and the integrity of API data. We analyze the security properties of TPM commands with a process reduction method, identify the key-handle hijack attack on a TPM newly created key, and propose reasonable solutions to solve the problem. Then, we conduct an experiment involving a key-handle attack, which successfully replaces a user key with an attacker's key using malicious TPM software. This paper discloses the weakness of the relationship between the key handle and the key object. After the TPM software stack is compromised, the attacker can launch a key-handle attack to obtain the user key and even break into the whole storage tree of user keys.
英文摘要The Trusted Platform Module (TPM) is a dedicated hardware chip designed to provide a higher level of security for computing platform. All TPM functionalities are implemented in TPM commands to achieve specific security goals. We attempt to analyze the security properties of these commands, especially the key management API. Our study utilizes applied pi calculus to formalize the commands and determine how their security properties affect TPM key management. The attacker is assumed to call TPM commands without bounds and without knowing the TPM root key, expecting to obtain or replace the user key. The analysis goal in our study is to guarantee the corresponding property of API execution and the integrity of API data. We analyze the security properties of TPM commands with a process reduction method, identify the key-handle hijack attack on a TPM newly created key, and propose reasonable solutions to solve the problem. Then, we conduct an experiment involving a key-handle attack, which successfully replaces a user key with an attacker's key using malicious TPM software. This paper discloses the weakness of the relationship between the key handle and the key object. After the TPM software stack is compromised, the attacker can launch a key-handle attack to obtain the user key and even break into the whole storage tree of user keys.
学科主题Telecommunications
收录类别SCI
资助信息National Natural Science Foundation of China 91118006, 61202414; Knowledge Innovation Project of Chinese Academy of Science ISCAS2009-DR14
语种英语
WOS记录号WOS:000310670600010
公开日期2013-09-17
内容类型期刊论文
源URL[http://ir.iscas.ac.cn/handle/311060/15062]  
专题软件研究所_软件所图书馆_期刊论文
推荐引用方式
GB/T 7714
Qin Yu,Zhao Shijun,Zhang Qianying. formal analysis of trusted platform module commands for compromising user key[J]. CHINA COMMUNICATIONS,2012,9(10):91-102.
APA Qin Yu,Zhao Shijun,&Zhang Qianying.(2012).formal analysis of trusted platform module commands for compromising user key.CHINA COMMUNICATIONS,9(10),91-102.
MLA Qin Yu,et al."formal analysis of trusted platform module commands for compromising user key".CHINA COMMUNICATIONS 9.10(2012):91-102.
个性服务
查看访问统计
相关权益政策
暂无数据
收藏/分享
所有评论 (0)
暂无评论
 

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。


©版权所有 ©2017 CSpace - Powered by CSpace