06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Appendix B<br />

CasperFDR Scripts<br />

Contents<br />

B.1 Brief Introduction to the CasperFDR . . . . . . . . . . . . . . . 241<br />

B.2 Attestation Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . 242<br />

B.3 Secure and Trusted Channel Protocol Service Provider . . 243<br />

B.4 Secure and Trusted Channel Protocol Smart Card . . . . . 244<br />

B.5 Application Acquisition and Contractual Agreement Protocol 246<br />

B.6 Application Binding Protocol Local . . . . . . . . . . . . . . 247<br />

B.7 Plat<strong>for</strong>m Binding Protocol . . . . . . . . . . . . . . . . . . . . . . 249<br />

B.8 Application Binding Protocol Distributed . . . . . . . . . . . 250<br />

This appendix opens the discussion with a short introduction to the CasperFDR framework.<br />

Subsequently, we present the Casper scripts <strong>for</strong> the protocols that we proposed in this thesis.<br />

240

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!