Title :
Practical Assessment of Biba Integrity for TCG-Enabled Platforms
Author :
Sassu, Roberto ; Ramunno, Gianluca ; Lioy, Antonio
Author_Institution :
Dip. di Autom. e Inf., Politec. di Torino, Turin, Italy
Abstract :
Checking the integrity of an application is necessary to determine if the latter will behave as expected. The method defined by the Trusted Computing Group consists in evaluating the fingerprints of the hardware and software components of a platform required for the proper functioning of the application to be assessed. However, this only ensures that a process was working correctly at load-time but not for the whole life-cycle. Policy-Reduced Integrity Measurement Architecture (PRIMA) addresses this problem by enforcing a security policy that denies information flows from potentially malicious processes to an application target of the evaluation and its dependencies (required by CW-Lite, an evolution of the Biba integrity model). Given the difficulty of deploying PRIMA, as platform administrators have to tune their security policies to satisfy the CW-Lite requirements, we propose Enhanced IMA, an extended version of the Integrity Measurement Architecture (IMA) that, unlike PRIMA, works almost out of the box and just reports information flows instead of enforcing them. In addition, we introduce a model to evaluate the information reported by Enhanced IMA with existing techniques.
Keywords :
data integrity; trusted computing; CW-Lite requirements; PRIMA; TCG-enabled platforms; application integrity; hardware component fingerprints; policy-reduced integrity measurement architecture; potentially malicious processes; practical biba integrity assessment; software component fingerprints; trusted computing group; Analytical models; Data models; Kernel; Load modeling; Security; Time measurement; Biba integrity; Remote attestation; information flow;
Conference_Titel :
Trust, Security and Privacy in Computing and Communications (TrustCom), 2014 IEEE 13th International Conference on
Conference_Location :
Beijing
DOI :
10.1109/TrustCom.2014.63