TU Darmstadt / ULB / TUbiblio

Key Attestation from Trusted Execution Environments

Kostiainen, Kari and Dmitrienko, Alexandra and Ekberg, Jan-Erik and Sadeghi, Ahmad-Reza and Asokan, N. (2010):
Key Attestation from Trusted Execution Environments.
In: TRUST 2010: Proceedings of the 3rd International Conference on Trust and Trustworthy Computing, Berlin, [Conference or Workshop Item]

Abstract

Credential platforms implemented on top of Trusted Execution Environments (TrEEs) allow users to store and use their credentials, e.g., cryptographic keys or user passwords, securely. One important requirement for a TrEE-based credential platform is the ability to attest that a credential has been created and is kept within the TrEE. Credential properties, such as usage permissions, should be also attested. Existing attestation mechanisms are limited to attesting which applications outside the TrEE are authorized to use the credential. In this paper we describe a novel key attestation mechanism that allows attestation of both TrEE internal and external key usage permissions. We have implemented this attestation mechanism for mobile phones with M-Shield TrEE.

Item Type: Conference or Workshop Item
Erschienen: 2010
Creators: Kostiainen, Kari and Dmitrienko, Alexandra and Ekberg, Jan-Erik and Sadeghi, Ahmad-Reza and Asokan, N.
Title: Key Attestation from Trusted Execution Environments
Language: German
Abstract:

Credential platforms implemented on top of Trusted Execution Environments (TrEEs) allow users to store and use their credentials, e.g., cryptographic keys or user passwords, securely. One important requirement for a TrEE-based credential platform is the ability to attest that a credential has been created and is kept within the TrEE. Credential properties, such as usage permissions, should be also attested. Existing attestation mechanisms are limited to attesting which applications outside the TrEE are authorized to use the credential. In this paper we describe a novel key attestation mechanism that allows attestation of both TrEE internal and external key usage permissions. We have implemented this attestation mechanism for mobile phones with M-Shield TrEE.

Title of Book: TRUST 2010: Proceedings of the 3rd International Conference on Trust and Trustworthy Computing
Uncontrolled Keywords: Secure Things
Divisions: 20 Department of Computer Science
20 Department of Computer Science > System Security Lab
LOEWE
LOEWE > LOEWE-Zentren
LOEWE > LOEWE-Zentren > CASED – Center for Advanced Security Research Darmstadt
Event Location: Berlin
Date Deposited: 10 Mar 2016 10:18
Identification Number: KDESA2010
Related URLs:
Export:
Suche nach Titel in: TUfind oder in Google

Optionen (nur für Redakteure)

View Item View Item