Catching the Cuckoo: Verifying TPM Proximity Using a Quote Timing Side-Channel

dc.contributor.authorFink, Russell A.
dc.contributor.authorSherman, Alan T.
dc.contributor.authorMitchell, Alexander O.
dc.contributor.authorChallener, David C.
dc.date.accessioned2019-02-21T16:33:47Z
dc.date.available2019-02-21T16:33:47Z
dc.date.issued2011-06-22
dc.descriptionInternational Conference on Trust and Trustworthy Computingen_US
dc.description.abstractWe present a Trusted Platform Module (TPM) application protocol that detects a certain man in the middle attack where an adversary captures and replaces a legitimate computing platform with an imposter that forwards platform authentication challenges to the captive over a high speed data link. This revised Cuckoo attack allows the imposter to satisfy a user's query of platform integrity, tricking the user into divulging sensitive information to the imposter. Our protocol uses an ordinary smart card to verify the platform boot integrity through TPM quote requests, and to verify TPM proximity by measuring TPM tickstamp times required to answer the quotes. Quotes not answered in an expected amount of time may indicate the presence of an imposter's data link, revealing the Cuckoo attack. We describe a timing model for the Cuckoo attack, and summarize experimental results that demonstrate the feasibility of using timing to detect the Cuckoo attack over practical levels of adversary link speeds.en_US
dc.description.urihttps://link.springer.com/chapter/10.1007/978-3-642-21599-5_22en_US
dc.format.extent8 pagesen_US
dc.genreconference papers and proceedings postprintsen_US
dc.identifierdoi:10.13016/m2mwnz-zyry
dc.identifier.citationFink R.A., Sherman A.T., Mitchell A.O., Challener D.C. (2011) Catching the Cuckoo: Verifying TPM Proximity Using a Quote Timing Side-Channel. In: McCune J.M., Balacheff B., Perrig A., Sadeghi AR., Sasse A., Beres Y. (eds) Trust and Trustworthy Computing. Trust 2011. Lecture Notes in Computer Science, vol 6740. Springer, Berlin, Heidelbergen_US
dc.identifier.urihttps://doi.org/10.1007/978-3-642-21599-5_22
dc.identifier.urihttp://hdl.handle.net/11603/12838
dc.language.isoen_USen_US
dc.publisherSpringer, Berlin, Heidelbergen_US
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Center for Research and Exploration in Space Sciences & Technology II (CRSST II)
dc.relation.ispartofUMBC Faculty Collection
dc.relation.ispartofUMBC Computer Science and Electrical Engineering Department
dc.rightsThis item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author.
dc.subjecttrusted platform module (TPM)en_US
dc.subjectattestationen_US
dc.subjecttimingen_US
dc.subjectquoteen_US
dc.titleCatching the Cuckoo: Verifying TPM Proximity Using a Quote Timing Side-Channelen_US
dc.typeTexten_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
FinkTRUST11.pdf
Size:
206.58 KB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
2.56 KB
Format:
Item-specific license agreed upon to submission
Description: