会议专题

Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model

  We present the first automated proof of the authorization protocols in TPM 2.0 in the computational model.The Trusted Plat form Module(TPM) is a chip that enables trust in computing platforms and achieves more security than software alone.The TPM interacts with a caller via a predefined set of commands.Many commands reference TPM-resident structures, and use of them may require authorization.The TPM will provide an acknowledgement once receiving an authoriza tion.This interact ensure the authentication of TPM and the caller.In this paper, we present a computationally sound mechanized proof for authorization protocols in the TPM 2.0.We model the authorization protocols using a probabilistic polynomial-time calculus and prove au thentication between the TPM and the caller with the aid of the tool CryptoVerif, which works in the computational model.In addition, the prover gives the upper bounds to break the authentication between them.

TPM Trusted Computing formal methods computational model authorization

Weijin Wang Yu Qin Dengguo Feng

Trusted Computing and Information Assurance Laboratory,Institute of Software,Chinese Academy of Sciences,Beijing,China

国际会议

The 10th International Conference on Information Security Practice and Experience(ISPEC 2014)(第十届信息安全实践国际会议)

福州

英文

144-158

2014-05-05(万方平台首次上网日期,不代表论文的发表时间)