TCG (Trusted Computing Group) has defined a set of standards. The main features of the standards are protection against theft of secrets held on the platform and a mechanism for the platform to prove that it is in a trusted state, called attestation. However, the attestation mechanism is vulnerable to relay attack because of the lack of linkage between the endpoint identity and attestation message. We show here how to defeat the attack by employing a new agent, called Network Interface Monitoring Agent (NIMA). In addition, we show that the NIMA-based approach can render DRM more robust and efficient, especially in case of protecting a company's sensitive data. © Springer-Verlag Berlin Heidelberg 2007.
CITATION STYLE
Choi, S., Han, J., & Jun, S. (2007). Improvement on TCG attestation and its implication for DRM. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4705 LNCS, pp. 912–925). Springer Verlag. https://doi.org/10.1007/978-3-540-74472-6_74
Mendeley helps you to discover research relevant for your work.