Browse > Article
http://dx.doi.org/10.5762/KAIS.2011.12.3.1356

Vulnerability Analysis of Insider Attack on TPM Command Authorization Protocol and Its Countermeasure  

Oh, Doo-Hwan (Dept. of Information Security, Hoseo University)
Choi, Doo-Sik (Dept. of Information Security, Hoseo University)
Kim, Ki-Hyun (Dept. of Computer Eng., Chungbuk National University)
Oh, Soo-Hyun (Dept. of Information Security, Hoseo University)
Ha, Jae-Cheol (Dept. of Information Security, Hoseo University)
Publication Information
Journal of the Korea Academia-Industrial cooperation Society / v.12, no.3, 2011 , pp. 1356-1366 More about this Journal
Abstract
The TPM(Trusted Platform Module) is a hardware chip to support a trusted computing environment. A rightful user needs a command authorization process in order to use principal TPM commands. To get command authorization from TPM chip, the user should perform the OIAP(Object-Independent Authorization Protocol) or OSAP(Object-Specific Authorization Protocol). Recently, Chen and Ryan alerted the vulnerability of insider attack on TPM command authorization protocol in multi-user environment and presented a countermeasure protocol SKAP(Session Key Authorization Protocol). In this paper, we simulated the possibility of insider attack on OSAP authorization protocol in real PC environment adopted a TPM chip. Furthermore, we proposed a novel countermeasure to defeat this insider attack and improve SKAP's disadvantages such as change of command suructures and need of symmetric key encryption algorithm. Our proposed protocol can prevent from insider attack by modifying of only OSAP command structure and adding of RSA encryption on user and decryption on TPM.
Keywords
TPM; OSAP; SRK secret; Authorization; Insider attack;
Citations & Related Records
연도 인용수 순위
  • Reference
1 ISO/IEC 11889-1 : Information technology - Security techniques - Trusted Platform Module - Part 1: Overview, 2009.
2 ISO/IEC 11889-2 : Information technology - Security techniques - Trusted Platform Module - Part 2: Design principles, 2009.
3 ISO/IEC 11889-3 : Information technology - Security techniques - Trusted Platform Module - Part 3: Structures, 2009.
4 ISO/IEC 11889-4 : Information technology - Security techniques - Trusted Platform Module - Part 4: Command, 2009.
5 NIST, "Secure Hash Standard", FIPS PUB 180-1, 1994.
6 L. Chen and M. Ryan, "Attack, solution and verification for shared authorization data in TCG TPM", 6th International Workshop on Formal Aspects in Security and Trust(FAST'09), pp. 201-216, 2009.
7 Trusted Computing Group, "TCG Software Stack(TSS) Specification Version 1.2 Level 1 Errata A", 2007.
8 Infineon, "Trusted Platform Module TPM 1.2 SLB 9636 TT 1.2", Available at http://www.infineon. com/tpm
9 NIST, "Advanced Encryption Standards", FIPS PUB 197, 2001.
10 김영수, 박영수, 박지만, 김무섭, 김영세, 주홍일, 김명은, 김학두, 최수길, 정성익, "신뢰 컴퓨팅과 TCG 동향", 전자통신동향분석, 제22권, 제1호, pp. 83-96, 2007.
11 강동호, 한진희, 이윤경, 조영섭, 한승완, 김정녀, 조현숙, "스마트폰 보안 위협 및 대응 기술", 전자통신동향분석, 제 25권 3호, 2010.
12 Trusted Computing Group, "About TCG", Available at http://www.trustedcomputinggroup. org