Catching the Cuckoo: Verifying TPM proximity using a quote timing side-channel (Short paper)

4Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We present a Trusted Platform Module (TPM) application protocol that detects a certain man in the middle attack where an adversary captures and replaces a legitimate computing platform with an imposter that forwards platform authentication challenges to the captive over a high speed data link. This revised Cuckoo attack allows the imposter to satisfy a user's query of platform integrity, tricking the user into divulging sensitive information to the imposter. Our protocol uses an ordinary smart card to verify the platform boot integrity through TPM quote requests, and to verify TPM proximity by measuring TPM tickstamp times required to answer the quotes. Quotes not answered in an expected amount of time may indicate the presence of an imposter's data link, revealing the Cuckoo attack. We describe a timing model for the Cuckoo attack, and summarize experimental results that demonstrate the feasibility of using timing to detect the Cuckoo attack over practical levels of adversary link speeds. © 2011 Springer-Verlag.

Author supplied keywords

Cite

CITATION STYLE

APA

Fink, R. A., Sherman, A. T., Mitchell, A. O., & Challener, D. C. (2011). Catching the Cuckoo: Verifying TPM proximity using a quote timing side-channel (Short paper). In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6740 LNCS, pp. 294–301). Springer Verlag. https://doi.org/10.1007/978-3-642-21599-5_22

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free