DAA protocol analysis and verification

4Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Direct Anonymous Attestation (DAA) is a popular trusted computing protocol for the anonymous authentication designed for TPM or other embedding devices. Many DAA schemes give out detailed cryptographic proof, however, their security properties has not been yet automatically analyzed and verified particularly against the intruder's or the malicious participant's attack. It is proposed that a DAA analysis model focusing on the intruder's attacks in this paper. The analysis method is the good supplements to the DAA cryptographic proof, though the intruder's capability is not completely assumed. According to DAA protocol status analysis, we find out some attacks like rudolph attack, masquerading attack by using the Murphi tool. At last the paper gives out the reasons for these attacks, and also presents the recommendation solutions against these attacks. From our study, we propose that DAA protocol must be carefully analyzed from the intruder attacking point of view in the DAA system design and implementation. © 2012 Springer-Verlag.

Cite

CITATION STYLE

APA

Qin, Y., Chu, X., Feng, D., & Feng, W. (2012). DAA protocol analysis and verification. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7222 LNCS, pp. 338–350). https://doi.org/10.1007/978-3-642-32298-3_21

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free