Software-Based Memory Erasure with relaxed isolation requirements

被引:0
|
作者
Bursuc, Sergiu [1 ]
Gil-Pons, Reynaldo [1 ]
Mauw, Sjouke [1 ]
Trujillo-Rasua, Rolando [2 ]
机构
[1] Univ Luxembourg, Esch Sur Alzette, Luxembourg
[2] Rovira & Virgili Univ, Tarragona, Spain
关键词
security protocols; formal verification; memory erasure; distant attacker; PROOFS; ATTESTATION;
D O I
10.1109/CSF61375.2024.00022
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A Proof of Secure Erasure (PoSE) is a communication protocol where a verifier seeks evidence that a prover has erased the memory on a given device within the time frame of the protocol execution. Designers of PoSE protocols have long been aware that, if a prover can outsource the computation of the memory erasure proof to another device, then their protocols are trivially defeated. As a result, most software-based PoSE protocols in the literature assume that provers are isolated during the protocol execution, that is, provers cannot receive help from a network adversary. Our main contribution is to show that this assumption is not necessary. We introduce formal models for PoSE protocols playing against provers aided by external conspirators and develop two PoSE protocols that we prove secure in this context. We reduce the requirement of isolation to the more realistic requirement that the communication with the external conspirator is relatively slow. Software-based protocols with such relaxed isolation assumptions are especially pertinent for low-end devices, where it is too costly to deploy sophisticated protection methods.
引用
收藏
页码:479 / 494
页数:16
相关论文
共 50 条
  • [1] Software-based erasure codes for scalable distributed storage
    Cooley, JA
    Mineweaser, JL
    Servi, LD
    Tsung, ET
    20TH IEEE/11TH NASA GODDARD CONFERENCE ON MASS STORAGE AND TECHNOLOGIES (MSST 2003), PROCEEDINGS, 2003, : 157 - 164
  • [2] Requirements elicitation for software-based systems
    Brereton, P
    Budgen, D
    Nwana, H
    SOFTWARE ENGINEERING JOURNAL, 1996, 11 (03): : 148 - 148
  • [3] Software-Based Erasure-Tolerant Coding with Buffering and Compression
    Sobe, Peter
    ARCHITECTURE OF COMPUTING SYSTEMS, ARCS 2024, 2024, 14842 : 333 - 343
  • [4] Requirements capture getting better software and software-based systems
    Manufacturing and Technology Unit, KPMG
    Eng Manage J, 3 (149-152):
  • [5] Requirements capture - Getting better software and software-based systems
    Alasdair, K
    COMPUTING & CONTROL ENGINEERING JOURNAL, 1996, 7 (03): : 138 - 140
  • [6] Embedding policy rules for software-based systems in a requirements context
    Strembeck, M
    Sixth IEEE International Workshop on Policies for Distributed Systems and Networks, Proceedings, 2005, : 235 - 238
  • [7] Harbor: Software-based memory protection for sensor nodes
    Kumar, Ram
    Kohler, Eddie
    Srivastava, Mani
    PROCEEDINGS OF THE SIXTH INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING IN SENSOR NETWORKS, 2007, : 340 - 349
  • [8] FaultLine: Software-based Fault Injection on Memory Transfers
    Gravellier, Joseph
    Dutertre, Jean-Max
    Teglia, Yannick
    Moundi, Philippe Loubet
    2021 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2021, : 46 - 55
  • [9] Software-Based Mitigation for Memory Address Decoder Aging
    Kraak, D. H. P.
    Gursoy, C. C.
    Agbo, I. O.
    Taouil, M.
    Jenihhin, M.
    Raik, J.
    Hamdioui, S.
    2019 20TH IEEE LATIN AMERICAN TEST SYMPOSIUM (LATS), 2019,
  • [10] Software-based Buffering of Associative Operations on Random Memory Addresses
    Hauck, Matthias
    Paradies, Marcus
    Froening, Holger
    2019 IEEE 33RD INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM (IPDPS 2019), 2019, : 943 - 952