{"title":"A Key to Embedded System Security: Locking and Unlocking Secrets with a Trusted Platform Module","authors":"Teri Lenard, A. Collen, N. A. Nijdam, B. Genge","doi":"10.1109/EuroSPW59978.2023.00041","DOIUrl":null,"url":null,"abstract":"Security hardware modules were designed to provide a viable solution that can empower Embedded Systems (ES) with state-of-the-art cryptographic and security capabilities. They can execute cryptographic operations, securely store sensitive information, or provide measurements for attestation. A key element in designing and implementing security solutions on top of a security hardware, such as the Trusted Platform Module (TPM), is secure secret storage. The work at hand addresses the problem of secret protection by showcasing how the TPM standard can serve as a vault in protecting sensitive information in ES. This is accomplished as follows. Secrets are locked in the TPM according to Platform Configuration Register (PCR) policies created on top of the system state and sealing. In contrast, unlocking is achieved through TPM unsealing. In both cases, secure and authenticated sessions are enforced while communicating with the TPM. Furthermore, our work goes a step further and presents a simple TPM attestation protocol, destined to verify the system state and TPM application. Lastly, a series of experiments were conducted on a reference hardware, with two different TPM configurations, to measure execution times of TPM operations.","PeriodicalId":220415,"journal":{"name":"2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EuroSPW59978.2023.00041","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Security hardware modules were designed to provide a viable solution that can empower Embedded Systems (ES) with state-of-the-art cryptographic and security capabilities. They can execute cryptographic operations, securely store sensitive information, or provide measurements for attestation. A key element in designing and implementing security solutions on top of a security hardware, such as the Trusted Platform Module (TPM), is secure secret storage. The work at hand addresses the problem of secret protection by showcasing how the TPM standard can serve as a vault in protecting sensitive information in ES. This is accomplished as follows. Secrets are locked in the TPM according to Platform Configuration Register (PCR) policies created on top of the system state and sealing. In contrast, unlocking is achieved through TPM unsealing. In both cases, secure and authenticated sessions are enforced while communicating with the TPM. Furthermore, our work goes a step further and presents a simple TPM attestation protocol, destined to verify the system state and TPM application. Lastly, a series of experiments were conducted on a reference hardware, with two different TPM configurations, to measure execution times of TPM operations.