On the Root of Trust Identification Problem

10/26/2020
by   Ivan De Oliveira Nunes, et al.
0

Root of Trust Identification (RTI) refers to determining whether a given security service or task is being performed by the particular root of trust (e.g., a TEE) within a specific physical device. Despite its importance, this problem has been mostly overlooked. We formalize the RTI problem and argue that security of RTI protocols is especially challenging due to local adversaries, cuckoo adversaries, and the combination thereof. To cope with this problem we propose a simple and effective protocol based on biometrics. Unlike biometric-based user authentication, our approach is not concerned with verifying user identity, and requires neither pre-enrollment nor persistent storage for biometric templates. Instead, it takes advantage of the difficulty of cloning a biometric in real-time to securely identify the root of trust of a given physical device, by using the biometric as a challenge. Security of the proposed protocol is analyzed in the combined Local and Cuckoo adversarial model. Also, a prototype implementation is used to demonstrate the protocol's feasibility and practicality. We further propose a Proxy RTI protocol, wherein a previously identified RoT assists a remote verifier in identifying new RoTs.

READ FULL TEXT
research
01/26/2021

Biometric Verification Secure Against Malicious Adversaries

Biometric verification has been widely deployed in current authenticatio...
research
11/20/2017

The Horcrux Protocol: A Method for Decentralized Biometric-based Self-sovereign Identity

Most user authentication methods and identity proving systems rely on a ...
research
05/06/2022

Near-collisions and their Impact on Biometric Security (long)

Biometric recognition encompasses two operating modes. The first one is ...
research
04/10/2020

Analyze and Development System with Multiple Biometric Identification

Cause of a rapid increase in technological development, increasing ident...
research
11/14/2017

PassBio: Privacy-Preserving User-Centric Biometric Authentication

The proliferation of online biometric authentication has necessitated se...
research
03/28/2018

SEMBA:SEcure multi-biometric authentication

Biometrics security is a dynamic research area spurred by the need to pr...
research
01/03/2018

New Directions for Trust in the Certificate Authority Ecosystem

Many of the benefits we derive from the Internet require trust in the au...

Please sign up or login with your details

Forgot password? Click here to reset