PRACTICAL VERIFICATION OF UNTRUSTED TERMINALS USING REMOTE ATTESTATION

Simone Lupetti, Gianluca Dini

2007

Abstract

We present a technique based on Trusted Computing’s remote attestation to enable the user of a public terminal to determine whether its configuration can be considered trustworthy or not. In particular, we show how the user can verify the software status of an untrusted terminal and be securely informed about the outcome of the verification. We present two flavors of this technique. In the first, the user makes use of a personal digital device with limited computing capabilities and a remote trusted server that performs the actual verification. In the second, the personal device is assumed to have enough computing power (as in the case of smart-phones and PDAs) to autonomously perform the verification procedure.

Download


Paper Citation


in Harvard Style

Lupetti S. and Dini G. (2007). PRACTICAL VERIFICATION OF UNTRUSTED TERMINALS USING REMOTE ATTESTATION . In Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007) ISBN 978-989-8111-12-8, pages 402-407. DOI: 10.5220/0002123304020407

in Bibtex Style

@conference{secrypt07,
author={Simone Lupetti and Gianluca Dini},
title={PRACTICAL VERIFICATION OF UNTRUSTED TERMINALS USING REMOTE ATTESTATION},
booktitle={Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007)},
year={2007},
pages={402-407},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002123304020407},
isbn={978-989-8111-12-8},
}


in EndNote Style

TY - CONF
JO - Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007)
TI - PRACTICAL VERIFICATION OF UNTRUSTED TERMINALS USING REMOTE ATTESTATION
SN - 978-989-8111-12-8
AU - Lupetti S.
AU - Dini G.
PY - 2007
SP - 402
EP - 407
DO - 10.5220/0002123304020407