Advanced Remote Firmware Upgrades Using TPM 2.0 - ICT Systems Security and Privacy Protection
Conference Papers Year : 2016

Advanced Remote Firmware Upgrades Using TPM 2.0

Abstract

A central aspect for securing connected embedded systems are remote firmware upgrades to deal with vulnerabilities discovered after deployment. In many scenarios, Hardware Security Modules such as the Trusted Computing Group’s Trusted Platform Module (TPM) 2.0 are used as a security-anchor in embedded systems. In this paper, we discuss the benefits of TPM 2.0 for securing embedded systems and present a concept for advanced remote firmware upgrade of an embedded system with enforcement of Intellectual Property Rights and Privacy protection of device-resident data (i.e., data that remains on the device during the flashing process). This concept utilizes unique features of TPM 2.0. Furthermore, a prototypical implementation using a hardware TPM 2.0 and the TPM Software Stack 2.0 low-level System API is presented as a proof-of-concept.
Fichier principal
Vignette du fichier
421518_1_En_19_Chapter.pdf (699.4 Ko) Télécharger le fichier
Origin Files produced by the author(s)
Loading...

Dates and versions

hal-01369561 , version 1 (21-09-2016)

Licence

Identifiers

Cite

Andreas Fuchs, Christoph Krauss, Jürgen Repp. Advanced Remote Firmware Upgrades Using TPM 2.0. 31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.276-289, ⟨10.1007/978-3-319-33630-5_19⟩. ⟨hal-01369561⟩
394 View
1071 Download

Altmetric

Share

More