Beta 1

Title Using TCG/DRTM for application-specific credential storage and usage
Author Bugiel, Sven
Supervisor Jensen, Christian D. (Embedded Systems Engineering, Department of Informatics and Mathematical Modeling, Technical University of Denmark, DTU, DK-2800 Kgs. Lyngby, Denmark)
Institution Technical University of Denmark, DTU, DK-2800 Kgs. Lyngby, Denmark
Thesis level Master's thesis
Year 2010
Abstract Today, most end-user devices are strongly personal. Laptops, mobile phones, and PDAs are rarely used by more than one individual. At the same time, a typical user is required to hold and use a plethora of virtual credentials to identify himself to networks and services. These passwords and keys are mostly stored on the user’s device. This has lead to the paradigm shift from an user-centric security model to a vastly simplified process-centric one. In absence of multiple users on the device, processes rather than users will take a central role in defining the achievable security level. The work in this thesis concentrates on the application-binding aspects between device security hardware and applications running on top of the device’s operating system. The hardware and software basis that is critical for the security of the system is denoted as the Trusted Computing Base (TCB). However, the size and complexity of the TCB in contemporary mainstream operating systems provides malware with a big attack surface to compromise system security and to gain illegitimate access to credentials. The Flicker architecture by Jonathan McCune of CMU provides the means to securely execute a small piece of security sensitive software (PAL) in an isolated execution environment with a minimal, secure TCB. Thereby, Flicker makes use of the TCG DRTM technology, available in contemporary PC chipsets. However, the link between an application, that leverages Flicker, and its PAL is missing. This raises the security issue that deployed credentials can be easily misused by other software on the system, such as malware. This thesis presents a Flicker based architecture, that establishes this missing link by providing a framework in which each application is bound to a softwarebased Mobile Trusted Module (MTM), effectively building a system with application-specific secure credentials. The viability of the architecture is confirmed by presenting a prototype implementation together with a related attacker model and security analysis.
Imprint Technical University of Denmark (DTU) : Kgs. Lyngby, Denmark
Series IMM-M.Sc.-2010-39
Original PDF ep10_39.pdf (1.15 MB)
Admin Creation date: 2010-06-28    Update date: 2010-06-28    Source: dtu    ID: 264181    Original MXD