Hardware based software Protection Flashcards
What is The Protection Pyramid ?
Secure Execution
Secure Storage
Attestation
Secure Execution
The program running should not be tampered with
Secure Storage
Secure storage of key
Attestation
To check the integrity of the system. Providing the proof for an action/software running.
For e.g. if the software running is correct or someone tampered with it
Need for Attestation
- Device Identification(Mac and IP are not secure, can be spoofed )
- Secure generation of Cryptographic keys
- Secure storage of keys
- Continuous health checks for possible compromise of the system
Static Model vs Dynamic Model
Static Model: Protection in which system software components constitute a hash chain. Static because it is done once at startup. Integrity check is done only once.
Dynamic: Protection when the software is executed. Integrity of the code is concerned over here.
Types of key in TPM
Endorsement key
Storage Root key
Attestation Identity key
Limitation of TPM
Storage of all hash for each software release
Start is secure not the whole lifecycle
Single point of failure to relies on third party for a verifier to attest
All computer does not have TPM
Privacy concerns for keys