Hardware based software Protection Flashcards

1
Q

What is The Protection Pyramid ?

A

Secure Execution
Secure Storage
Attestation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Secure Execution

A

The program running should not be tampered with

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Secure Storage

A

Secure storage of key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Attestation

A

To check the integrity of the system. Providing the proof for an action/software running.
For e.g. if the software running is correct or someone tampered with it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Need for Attestation

A
  1. Device Identification(Mac and IP are not secure, can be spoofed )
  2. Secure generation of Cryptographic keys
  3. Secure storage of keys
  4. Continuous health checks for possible compromise of the system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Static Model vs Dynamic Model

A

Static Model: Protection in which system software components constitute a hash chain. Static because it is done once at startup. Integrity check is done only once.

Dynamic: Protection when the software is executed. Integrity of the code is concerned over here.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Types of key in TPM

A

Endorsement key
Storage Root key
Attestation Identity key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Limitation of TPM

A

Storage of all hash for each software release
Start is secure not the whole lifecycle
Single point of failure to relies on third party for a verifier to attest
All computer does not have TPM
Privacy concerns for keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly