Abstract
TCG (Trusted Computing Group) has defined a set of standards. The main features of the standards are protection against theft of secrets held on the platform and a mechanism for the platform to prove that it is in a trusted state, called attestation. However, the attestation mechanism is vulnerable to relay attack because of the lack of linkage between the endpoint identity and attestation message. We show here how to defeat the attack by employing a new agent, called Network Interface Monitoring Agent (NIMA). In addition, we show that the NIMA-based approach can render DRM more robust and efficient, especially in case of protecting a company’s sensitive data.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Trusted Computing Group: TNC Architecture for Interoperability. Specification Version 1.1 (May 1, 2006), http://www.trustedcomputinggroup.org
Trusted Computing Group: TCG Specification Architecture Overview. Specification Revision 1.2 (April 28, 2004), http://www.trustedcomputinggroup.org
Sbalacheff, B., Chen, I., Pearson, S., Plaquin, D., Proudler, G.: trusted computing platforms tcpa technology in context. Hewlett-Packard Books, ISBN 0-13-009220-7
Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and Implementation of a TCG-based Integrity Measurement Architecture. In: 13th Usenix Security Symposium, pp. 223–238 (August 2004)
Maruyama, H., Nakamura, T., Munetoh, S., Funaki, Y., Yamashita, Y.: Linux with TCPA Integrity Measurement. IBM Research Report (January 28, 2003)
Goldman, K., Perez, R., Sailer, R.: Linking Remote Attestation to Secure Tunnel Endpoints. In: First ACM Workshop on Scalable Trusted Computing, pp. 21–24. ACM, New York (November 2006)
Trusted Computing Group: TPM Main Part3 commands. Specification Revision 1.2 (February 13, 2005), http://www.trustedcomputinggroup.org
Yu, Y., Chiueh, T.-c.: Display-only file server: a solution against information theft due to insider attack. In: 4th ACM workshop on Digital rights management, ACM, New York (2004)
Reid, J.F., Caelli, W.J.: DRM, Trusted Computing and Operating System Architecture. In: Australasian Information Security Workshop (2005)
Measurement Log Example: http://domino.research.ibm.com/comm/research_projects.nsf/pages/ssd_ima.measurements.html
ARP Spoofing: http://www.rootsecure.net/content/downloads/pdf/arp_spoofing_intro.pdf
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Choi, S., Han, J., Jun, S. (2007). Improvement on TCG Attestation and Its Implication for DRM. In: Gervasi, O., Gavrilova, M.L. (eds) Computational Science and Its Applications – ICCSA 2007. ICCSA 2007. Lecture Notes in Computer Science, vol 4705. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74472-6_74
Download citation
DOI: https://doi.org/10.1007/978-3-540-74472-6_74
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74468-9
Online ISBN: 978-3-540-74472-6
eBook Packages: Computer ScienceComputer Science (R0)