Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.

Establishing Secure Communication Channels Using Remote Attestation with TPM 2.0

: Wagner, Paul Georg; Birnstill, Pascal; Beyerer, Jürgen


Markantonakis, Kostantinos (Ed.):
Security and Trust Management. 16th International Workshop, STM 2020. Proceedings : Guildford, UK, September 17-18, 2020, online event
Cham: Springer Nature, 2020 (Lecture Notes in Computer Science 12386)
ISBN: 978-3-030-59816-7 (Print)
ISBN: 978-3-030-59817-4 (Online)
International Workshop on Security and Trust Management (STM) <16, 2020, Online>
European Symposium on Research in Computer Security (ESORICS) <25, 2020, Online>
Fraunhofer IOSB ()
trusted computing; Trusted platform modules; remote attestation; key establishment; secure channel; attestation protocols

Remote attestation allows a verifier to remotely check the integrity of a trusted computing platform. In recent years a number of attestation protocols based on Trusted Platform Modules (TPMs) have been proposed. These protocols cryptographically verify a trusted platform’s state by exchanging TPM-signed quotes. Some of them also establish an encrypted channel to the trusted platform, which allows the verifier to transmit information that only the attested software stack can read. However, many existing attestation protocols are either vulnerable against man-in-the-middle attacks, or depend on outdated TPM specifications. In this work we analyze a recently developed attestation protocol that is being actively used to interconnect highly distributed trusted applications. We find this protocol to be vulnerable against a variant of the classical relay attack. In response to this threat we develop a lightweight remote attestation protocol based on the TPM 2.0 specification that is not vulnerable to this attack. Unlike previous proposals, our protocol relies solely on the TPM to establish a shared key on the attested channel, which significantly reduces its attack surface. Our protocol supports mutual attestation, perfect forward secrecy and is independent of the underlying network stack. We provide a reference implementation of our protocol and compare its performance to previous proposals. We also analyze its security properties using the Tamarin theorem prover.