CryptoDB
Secure Code Update for Embedded Devices via Proofs of Secure Erasure
Authors: | |
---|---|
Download: | |
Abstract: | Remote attestation is the process of verifying internal state of a remote embedded device. It is an important component of many security protocols and applications. Although techniques assisted by specialized secure hardware are effective, they not yet viable for low-cost embedded devices. One notable alternative is software-based attestation which is both less costly and more efficient. However, recent results identified weaknesses in some proposed methods, thus showing that security of remote software attestation remains a challenge. Inspired by these developments, this paper explores a different approach that relies neither on secure hardware nor on tight timing constraints. By taking advantage of the bounded memory/storage model of low-cost embedded devices and assuming a small amount of read-only memory (ROM), our uses a new primitive -- Proofs of Secure Erasure (PoSE-s). We show that, even though our PoSE-based approach is effective and provably secure, it is not cheap. However, it is particularly well-suited and practical for two other related tasks: secure code update and secure memory/storage erasure. We consider several flavors of PoSE-based protocols and demonstrate their feasibility in the context of existing commodity embedded devices. |
BibTeX
@misc{eprint-2010-23118, title={Secure Code Update for Embedded Devices via Proofs of Secure Erasure}, booktitle={IACR Eprint archive}, keywords={applications / smart cards}, url={http://eprint.iacr.org/2010/217}, note={ perito@inrialpes.fr 14820 received 19 Apr 2010, last revised 30 Jul 2010}, author={Daniele Perito and Gene Tsudik}, year=2010 }