Show simple item record

dc.contributor.authorLebedev, Ilia
dc.contributor.authorHogan, Kyle
dc.contributor.authorDevadas, Srinivas
dc.date.accessioned2021-11-08T12:31:39Z
dc.date.available2021-11-08T12:31:39Z
dc.date.issued2018-07
dc.identifier.urihttps://hdl.handle.net/1721.1/137629
dc.description.abstract© 2018 IEEE. During the secure boot process for a trusted execution environment, the processor must provide a chain of certificates to the remote client demonstrating that their secure container was established as specified. This certificate chain is rooted at the hardware manufacturer who is responsible for constructing chips according to the correct specification and provisioning them with key material. We consider a semi-honest manufacturer who is assumed to construct chips correctly, but may attempt to obtain knowledge of client private keys during the process. Using the RISC-V Rocket chip architecture as a base, we design, document, and implement an attested execution processor that does not require secure non-volatile memory, nor a private key explicitly assigned by the manufacturer. Instead, the processor derives its cryptographic identity from manufacturing variation measured by a Physical Unclonable Function (PUF). Software executed by a bootloader built into the processor transforms the PUF output into an elliptic curve key pair. The (re)generated private key is used to sign trusted portions of the boot image, and is immediately destroyed. The platform can therefore provide attestations about its state to remote clients. Reliability and security of PUF keys are ensured through the use of a trapdoor computational fuzzy extractor. We present detailed evaluation results for secure boot and attestation by a client of a Rocket chip implementation on a Xilinx Zynq 7000 FPGA.en_US
dc.language.isoen
dc.publisherIEEEen_US
dc.relation.isversionof10.1109/csf.2018.00011en_US
dc.rightsCreative Commons Attribution-Noncommercial-Share Alikeen_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/4.0/en_US
dc.sourceOther repositoryen_US
dc.titleInvited Paper: Secure Boot and Remote Attestation in the Sanctum Processoren_US
dc.typeArticleen_US
dc.identifier.citationLebedev, Ilia, Hogan, Kyle and Devadas, Srinivas. 2018. "Invited Paper: Secure Boot and Remote Attestation in the Sanctum Processor."
dc.contributor.departmentMassachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory
dc.eprint.versionAuthor's final manuscripten_US
dc.type.urihttp://purl.org/eprint/type/ConferencePaperen_US
eprint.statushttp://purl.org/eprint/status/NonPeerRevieweden_US
dc.date.updated2019-05-28T17:04:29Z
dspace.date.submission2019-05-28T17:04:30Z
mit.licenseOPEN_ACCESS_POLICY
mit.metadata.statusAuthority Work and Publication Information Neededen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record