Opinion: Advancing remote attestation via computer-aided formal verification of designs and synthesis of executables

1Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Remote Attestation (RA) of embedded/smart/IoT devices is a very important issue on today's security landscape. RA enables a verifier to measures the current internal memory state of an untrusted remote device (prover). RA helps the verifier establish a static or dynamic root of trust in prover. Despite much prior work, state-ofthe- art RA techniques unfortunately still lack any solid foundation and offer no ironclad security, safety or robustness guarantees. This paper argues that computer-aided formal verification, and synthesis of executables, of RA protocols and hybrid (software-hardware) architectures is required and currently unaddressed.We believe that this is achievable with current (computer-aided) formal methods frameworks and tools, and that this can help advance and mature RA research if used to establish more rigorous and clear security arguments. To support our opinion, we highlight several examples where subtle issues were missed in the design and security analysis of RA techniques. Despite deceptive simplicity of such protocols, manual analyses and ad hoc implementations often lead to oversimplification of (and subsequent glossing over) important details in the underlying processor and system architectures. Computeraided formal verification forces a more scrupulous and disciplined consideration of such details, since, otherwise, verification simply fails. The key objective of the research direction we propose is to increase confidence in correctness and security guarantees of current and future RA techniques and their implementations.

Cite

CITATION STYLE

APA

Eldefrawy, K., & Tsudik, G. (2019). Opinion: Advancing remote attestation via computer-aided formal verification of designs and synthesis of executables. In WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks (pp. 45–48). Association for Computing Machinery, Inc. https://doi.org/10.1145/3317549.3323403

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free