06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

7.7 Analysis of the Proposed Protocols<br />

• SOG-20: A malicious application can be installed with either a server or a client application's<br />

AID. However, the ABP does not allow a malicious application to masquerade<br />

as a server or client application because to prove the identity of an application, the ABP<br />

does not rely on the AIDs. It has a dynamic mechanism with bi-directional exchanges<br />

of messages that ascertain the entity and check its credentials (based on cryptographic<br />

certicate and signature generation/verication). There<strong>for</strong>e, it might be dicult <strong>for</strong> a<br />

masquerading application to match the cryptographic hash (generated by the TEM) and<br />

have the signature key of the genuine application.<br />

A malicious user can relay the binding request messages, but when these messages are<br />

<strong>for</strong>warded to the TEM to generate the hash of the client and server application, a malicious<br />

application's hash will not match the certied hash of the client and server application.<br />

This is equivalent to violating the 2nd pre-image property of the hash functions [146].<br />

In addition, IMA messages include random numbers that eectively prevent any replay<br />

attacks.<br />

The server and client applications authenticate one another. The authentication is achieved<br />

through signing the messages along with communicating the application's certicate. The<br />

authentication gives an assurance to each of the participant applications that the other<br />

application is genuine (eectively avoiding masquerading).<br />

• SOG-21: The application certicate contains details of the user to whom the application<br />

was issued. There<strong>for</strong>e, if a client application tries to establish an application sharing with<br />

a server application, but their customer credential does not match, the request is denied.<br />

This avoids application sharing between two applications from dierent users.<br />

7.7.2 Revisiting the Requirements and Goals<br />

In this section, we only discuss SOG-20 and SOG-21. For SOG-1 to SOG19 refer to sections<br />

6.6.1 and 6.6.3.<br />

All selected protocols <strong>for</strong> comparison can be adapted to support SOG-20 in the way discussed<br />

in section 7.7.1. Furthermore, the PBP does not support both SOG-19 and SOG-20<br />

as it is a protocol designed <strong>for</strong> establishing a binding relationship between UCTDs, not<br />

their applications, whereas, SOG-19 and SOG-20 focus on application binding rather than<br />

plat<strong>for</strong>m binding. A point to note is that ABPL does not support a number of the SOGs,<br />

<strong>for</strong> the reason that ABPL key generation is based on a symmetric cryptosystem. The<br />

ABPL do uses signature algorithms <strong>for</strong> entity authentication, and they do not play any<br />

role in key generation. Furthermore, the key generation in the ABPL is per<strong>for</strong>med mainly<br />

by the TEM and server application, without any input from other communicating entities.<br />

182

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!