Alternative Solution for Evaluation of Mutable Fles
7
Unknown Impact of Process Actions without MAC
8
Protect Mutable Files with Mandatory Access Control
9
Integrity Models - Biba vs Clark-Wison
10
PRIMA Overview and Drawbacks
11
Our Proposal to Simplify and Complete PRIMA
12
Reduce TCB size
13
Detect Malicious Updates of Mutable Fles
14
Exclude Mutable Files from Measurement
15
Chained Integrity Verification across Reboots
16
Implicit RA-Verification Options
17
Infollow LSM Implementation - Setup Phase
18
Infoflow LSM Implementation - Deployment Phase
19
Source Code
20
Conclusions
Description:
Explore a simple protocol for remote attestation of system integrity in this 29-minute Linux Foundation conference talk. Learn how to overcome the limitations of TPM key sealing with the proposed IMA Digest Lists extension, enabling the inclusion of Integrity Measurement Architecture (IMA) measurements in platform state. Discover a streamlined solution for remote attestation that eliminates the need for dedicated servers by leveraging TLS channel endpoints and the TCG's Subject Key Attestation Evidence (SKAE) X.509 extension. Delve into the feasibility issues of conventional solutions, understand the tradeoffs made, and gain insights into protecting mutable files, reducing TCB size, and implementing chained integrity verification across reboots. Examine the Infoflow LSM implementation process and explore the source code to enhance your understanding of this innovative approach to system integrity attestation.
A Simple Protocol for Remote Attestation of System Integrity