Vulnerability Analysis of Insider Attack on TPM Command Authorization Protocol and Its Countermeasure
![]() |
Oh, Doo-Hwan
(Dept. of Information Security, Hoseo University)
Choi, Doo-Sik (Dept. of Information Security, Hoseo University) Kim, Ki-Hyun (Dept. of Computer Eng., Chungbuk National University) Oh, Soo-Hyun (Dept. of Information Security, Hoseo University) Ha, Jae-Cheol (Dept. of Information Security, Hoseo University) |
1 | ISO/IEC 11889-1 : Information technology - Security techniques - Trusted Platform Module - Part 1: Overview, 2009. |
2 | ISO/IEC 11889-2 : Information technology - Security techniques - Trusted Platform Module - Part 2: Design principles, 2009. |
3 | ISO/IEC 11889-3 : Information technology - Security techniques - Trusted Platform Module - Part 3: Structures, 2009. |
4 | ISO/IEC 11889-4 : Information technology - Security techniques - Trusted Platform Module - Part 4: Command, 2009. |
5 | NIST, "Secure Hash Standard", FIPS PUB 180-1, 1994. |
6 | L. Chen and M. Ryan, "Attack, solution and verification for shared authorization data in TCG TPM", 6th International Workshop on Formal Aspects in Security and Trust(FAST'09), pp. 201-216, 2009. |
7 | Trusted Computing Group, "TCG Software Stack(TSS) Specification Version 1.2 Level 1 Errata A", 2007. |
8 | Infineon, "Trusted Platform Module TPM 1.2 SLB 9636 TT 1.2", Available at http://www.infineon. com/tpm |
9 | NIST, "Advanced Encryption Standards", FIPS PUB 197, 2001. |
10 | 김영수, 박영수, 박지만, 김무섭, 김영세, 주홍일, 김명은, 김학두, 최수길, 정성익, "신뢰 컴퓨팅과 TCG 동향", 전자통신동향분석, 제22권, 제1호, pp. 83-96, 2007. |
11 | 강동호, 한진희, 이윤경, 조영섭, 한승완, 김정녀, 조현숙, "스마트폰 보안 위협 및 대응 기술", 전자통신동향분석, 제 25권 3호, 2010. |
12 | Trusted Computing Group, "About TCG", Available at http://www.trustedcomputinggroup. org |
![]() |