Proceedings of the 4th ACM Conference on Data and Application Security and Privacy 2014
DOI: 10.1145/2557547.2557569
|View full text |Cite
|
Sign up to set email alerts
|

SobTrA

Abstract: In this paper, we present SobTrA, a Software-based Trust Anchor for ARM Cortex-A processors to protect systems against software-based attacks. SobTrA enables the implementation of a software-based secure boot controlled by a third party independent from the manufacturer. Compared to hardware-based trust anchors, our concept provides some other advantages like being updateable and also usable on legacy hardware. The presented software-based trust anchor involves a trusted third party device, the verifier, local… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(9 citation statements)
references
References 18 publications
0
9
0
Order By: Relevance
“…The attacks which can be carried out against an attestation protocol have been described in detail in the context of WSN and IoT respectively by [15] and [21]. However, we note that communicating with a faster machine than the client to compute r P (this attack is called a proxy attack) is considered as being out of scope by some of the works which we study [48], [90], [91].…”
Section: ) Challengesmentioning
confidence: 99%
See 3 more Smart Citations
“…The attacks which can be carried out against an attestation protocol have been described in detail in the context of WSN and IoT respectively by [15] and [21]. However, we note that communicating with a faster machine than the client to compute r P (this attack is called a proxy attack) is considered as being out of scope by some of the works which we study [48], [90], [91].…”
Section: ) Challengesmentioning
confidence: 99%
“…To ensure a sufficient evidence level, software-based approaches use several techniques. First, the evidence can rely on the optimality of the attestation procedure [47], [48], [87], [91], [92]. Any modification of the procedure by an attacker will thus be detected by the verifier due to the higher than usual execution time.…”
Section: ) Evidence Acquisitionmentioning
confidence: 99%
See 2 more Smart Citations
“…The subject has been extensively studied in the last two decades, coinciding with the widespread dissemination of smart devices and embedded software in general. Some works propose the formalization of the basic steps of the verification process [16,17], while other works are concerned in establishing the root of trust (RoT) [18]. Recently, some works [19,20] propose the use of physically unclonable functions (PUFs) to integrate the verification process, making it more tamper-resistant.…”
Section: Software Control In Cyber-physical Systemsmentioning
confidence: 99%