For the current REF see the REF 2021 website REF 2021 logo

Output details

11 - Computer Science and Informatics

University of Birmingham

Return to search Previous output Next output
Output 0 of 0 in the submission
Output title

Attack, Solution and Verification for Shared Authorisation Data in TCG TPM

Type
E - Conference contribution
Name of conference/published proceedings
Formal Aspects in Security and Trust : 6th International Workshop, FAST 2009, Eindhoven, The Netherlands, November 5-6, 2009, Revised Selected Papers
Volume number
5983
Issue number
-
First page of article
201
ISSN of proceedings
0302-9743
Year of publication
2010
URL
-
Number of additional authors
1
Additional information

<19>The paper reports two original attacks on the authorisation protocols of TPM, which is a hardware security chip present in 600 million computers. We specify revised protocols, and formally verify their correctness. The industry consortium that specifies the chip has adopted those revised protocols for its version 2.0 of the chip, shipping in 2014. Manufactuers will make hundreds of millions (perhaps billions) of the chips incorporating our solution. This work has led to keynote talks at two conferences, as well as a gift from Microsoft of $45,000 to fund futher analysis and verification of TPM protocols.

Interdisciplinary
-
Cross-referral requested
-
Research group
E - Security and Privacy
Citation count
7
Proposed double-weighted
No
Double-weighted statement
-
Reserve for a double-weighted output
No
Non-English
No
English abstract
-