首页> 外文期刊>Computers & mathematics with applications >A hijacker's guide to communication interfaces of the trusted platform module
【24h】

A hijacker's guide to communication interfaces of the trusted platform module

机译:可信平台模块通信接口的劫机者指南

获取原文
获取原文并翻译 | 示例

摘要

In this paper, we analyze the communication of trusted platform modules and their interface to the hosting platforms. While trusted platform modules are considered to be tamper resistant, the communication channel between these modules and the rest of the trusted platform turns out to be comparatively insecure. It has been shown that passive attacks can be mounted against TPMs and their bus communication with fairly inexpensive equipment, however, similar active attacks have not been reported, yet. We pursue the idea of an active attack and show how the communication protocol of the LPC bus can be actively manipulated with basic and inexpensive equipment. Moreover, we show how our manipulations can be used to circumvent the security mechanisms, e.g. the chain of trust, provided by modern trusted platforms. In addition, we demonstrate how the proposed attack can be extended to manipulate communication buses on embedded systems.
机译:在本文中,我们分析了可信平台模块的通信及其与托管平台的接口。尽管可信平台模块被认为具有防篡改功能,但这些模块与其余可信平台之间的通信通道却相对不安全。已经表明,可以使用相当便宜的设备对TPM及其总线通信进行被动攻击,但是,尚未报道类似的主动攻击。我们追求主动攻击的思想,并说明如何使用基本且廉价的设备主动操纵LPC总线的通信协议。此外,我们展示了如何使用我们的操作来规避安全机制,例如现代可信任平台提供的信任链。此外,我们演示了如何将建议的攻击扩展到操纵嵌入式系统上的通信总线。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号