Software attestation has become a popular and challenging research topic at many established security conferences with an expected strong impact in practice. It aims at verifying the software integrity of (typically) resource-constrained embedded devices. However, for practical reasons, software attestation cannot rely on stored cryptographic secrets or dedicated trusted hardware. Instead, it exploits side-channel information, such as the time that the underlying device needs for a specific computation. As traditional cryptographic solutions and arguments are not applicable, novel approaches for the design and analysis are necessary. This is certainly one of the main reasons why the security goals, properties and underlying assumptions of existing software attestation schemes have been only vaguely discussed so far, limiting the confidence in their security claims. Thus, putting software attestation on a solid ground and having a founded approach for designing secure software attestation schemes is still an important open problem.We provide the first steps towards closing this gap. Our first contribution is a security framework that formally captures security goals, attacker models and various system and design parameters. Moreover, we present a generic software attestation scheme that covers most existing schemes in the literature. Finally, we analyze its security within our framework, yielding sufficient conditions for provably secure software attestation schemes. We expect that such a consolidating work allows for a meaningful security analysis of existing schemes, supports the design of secure software attestation schemes and will inspire new research in this area.
Bacterial wilt, caused by Ralstonia solanacearum, is emerging as a major threat to potato production in Ethiopia, reaching epidemic proportions in the Chencha district recently, with a prevalence of 97% of potato fields in 2015. The recent disease outbreak in the district coincided with a significant introduction of seed potatoes. This research was therefore initiated to genetically characterize the pathogen so as to trace its source, identify its relationship with outbreaks in the rest of the country, and make intervention recommendations. Ralstonia solanacearum isolates were sampled both from seed and ware potato fields in Chencha and from seed potato fields in production regions suspected of being potential sources of the pathogen. Multiplex PCR and phylogenetic analysis of partial endoglucanase gene sequences identified all of the isolates as phylotype IIB sequevar 1. VNTR sequence analysis distinguished 11 different haplotypes, nine of which were unique to the Chencha district. However, one of the haplotypes was common to all seed potato producer regions of Ethiopia except for the Shashemene area. The unique and diverse VNTR haplotypes of the pathogen in Chencha indicates that it is well established in the district. When a geographical map of the VNTR haplotypes was superimposed with the main cross‐regional seed potato distribution pattern of the country, it became evident that the pathogen was being disseminated via latently infected seed from the Holeta‐Jeldu area in the Central Highlands of Ethiopia. Identification of largely uninfected highland districts and multiplication of high‐grade seed potato exclusively in those districts should be given priority.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.