DARPA: Device Attestation Resilient to Physical Attacks
Title | DARPA: Device Attestation Resilient to Physical Attacks |
Publication Type | Conference Paper |
Year of Publication | 2016 |
Authors | Ibrahim, Ahmad, Sadeghi, Ahmad-Reza, Tsudik, Gene, Zeitouni, Shaza |
Conference Name | Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks |
Publisher | ACM |
Conference Location | New York, NY, USA |
ISBN Number | 978-1-4503-4270-4 |
Keywords | attestation, capture, collective attestation, embedded devices, Metrics, networks, Neural Network, Neural networks, neural networks security, physical attacks, policy-based governance, pubcrawl, Resiliency |
Abstract | As embedded devices (under the guise of "smart-whatever") rapidly proliferate into many domains, they become attractive targets for malware. Protecting them from software and physical attacks becomes both important and challenging. Remote attestation is a basic tool for mitigating such attacks. It allows a trusted party (verifier) to remotely assess software integrity of a remote, untrusted, and possibly compromised, embedded device (prover). Prior remote attestation methods focus on software (malware) attacks in a one-verifier/one-prover setting. Physical attacks on provers are generally ruled out as being either unrealistic or impossible to mitigate. In this paper, we argue that physical attacks must be considered, particularly, in the context of many provers, e.g., a network, of devices. As- suming that physical attacks require capture and subsequent temporary disablement of the victim device(s), we propose DARPA, a light-weight protocol that takes advantage of absence detection to identify suspected devices. DARPA is resilient against a very strong adversary and imposes minimal additional hardware requirements. We justify and identify DARPA's design goals and evaluate its security and costs. |
URL | http://doi.acm.org/10.1145/2939918.2939938 |
DOI | 10.1145/2939918.2939938 |
Citation Key | ibrahim_darpa:_2016 |