06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

4.3 Trusted Environment & Execution Manager<br />

to the cardholder's security manager except that the cardholder's security manager caters<br />

to a user's requirements whereas the subscription manager caters to an administrative authority.<br />

The subscription manager is an optional manager and is only required if a user<br />

wants to be part of an administrative authority or if the UCOM plat<strong>for</strong>m is issued by<br />

an organisation that wants to keep control of its interests <strong>for</strong> example, a mobile network<br />

operator that subsidises UCTDs to its customers.<br />

4.3 Trusted Environment & Execution Manager<br />

On a typical smart card, several mechanisms are in place to test and verify the state of<br />

the plat<strong>for</strong>m (both software and hardware). At the software level, GlobalPlat<strong>for</strong>m card<br />

specication has proposed the controlling authority (termed CA in the GlobalPlat<strong>for</strong>m<br />

card specication) [74] and the Mandated Data Authentication Pattern (Mandated DAP)<br />

mechanism [30, 74]. In the DAP mechanism, an o-card entity (controlling authority) signs<br />

applications that are being loaded onto a smart card, and this approval of the applications<br />

is veried by an oncard entity referred to as the GlobalPlat<strong>for</strong>m card manager [30]. At<br />

the hardware level, the Known Answer Test (KAT) <strong>for</strong> cryptographic modules mandated<br />

by FIPS [113] and similar mechanism are deployed by the smart card manufacturer (i.e.<br />

RAM test, and checking checksum of non-volatile memory, etc.) [5].<br />

At the time of writing (September 2011), the Trusted Computing Group (TCG) was initiating<br />

a working group to devise specications <strong>for</strong> a trusted module <strong>for</strong> embedded devices<br />

[114]. The working group has not released any specications regarding the trusted<br />

module <strong>for</strong> embedded devices. We propose the Trusted Environment & Execution Manager<br />

(TEM) as a trusted module <strong>for</strong> embedded devices like smart cards. The TEM is fundamentally<br />

dierent from the Trusted Plat<strong>for</strong>m Module (TPM) [18] and Mobile Trusted Module<br />

(MTM) [19] in two respects. Firstly, the TEM implements a self-test mechanism that includes<br />

hardware parameters to provide remote attestation and a dynamically congurable<br />

integrity measurement mechanism that is based on a challenge-response framework. Secondly,<br />

the TEM is not based on a static architecture; in fact, it en<strong>for</strong>ces plat<strong>for</strong>m security<br />

policies during the application execution rather than just generating the hash (once) at<br />

the start of the application execution. The architecture of the TEM is illustrated in gure<br />

4.2.<br />

The concept of TEM is to group/provide similar and enhanced functionality that provides<br />

assurance and validation of the plat<strong>for</strong>m to requesting on-card or o-card entities. The<br />

TEM is independent of the plat<strong>for</strong>m conguration that is mainly concerned with the smart<br />

card runtime environment, which can be based on a technology such as Java Card or<br />

Multos. A TEM does not have to be implemented in hardware; it can be software-based<br />

85

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!