I thought I would share with you an analysis of a protocol that uses TPM Quote as the bases of remote attestation. The operations on the target of the attestation are the ones implemented in the TPM Quote Tools package. For this protocol, a TPM forms a root of trust for reporting.
Title: An Analysis of the CAVES Attestation Protocol using CPSA Abstract: This paper describes the CAVES attestation protocol and presents a tool-supported analysis showing that the runs of the protocol achieve stated goals. The goals are stated formally by annotating the protocol with logical formulas using the rely-guarantee method. The protocol analysis tool used is the Cryptographic Protocol Shape Analyzer. The paper: http://www.ccs.neu.edu/home/ramsdell/papers/caves.pdf CPSA: http://hackage.haskell.org/package/cpsa ------------------------------------------------------------------------------ EditLive Enterprise is the world's most technically advanced content authoring tool. Experience the power of Track Changes, Inline Image Editing and ensure content is compliant with Accessibility Checking. http://p.sf.net/sfu/ephox-dev2dev _______________________________________________ TrouSerS-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/trousers-users
