I thought I would share with you an analysis of a protocol that uses
TPM Quote as the bases of remote attestation.  The operations on the
target of the attestation are the ones implemented in the TPM Quote
Tools package.  For this protocol, a TPM forms a root of trust for
reporting. 

Title:

An Analysis of the CAVES Attestation Protocol using CPSA

Abstract:

This paper describes the CAVES attestation protocol and presents a
tool-supported analysis showing that the runs of the protocol achieve
stated goals.  The goals are stated formally by annotating the
protocol with logical formulas using the rely-guarantee method.  The
protocol analysis tool used is the Cryptographic Protocol Shape
Analyzer.

The paper:

http://www.ccs.neu.edu/home/ramsdell/papers/caves.pdf

CPSA:

http://hackage.haskell.org/package/cpsa

------------------------------------------------------------------------------
EditLive Enterprise is the world's most technically advanced content
authoring tool. Experience the power of Track Changes, Inline Image
Editing and ensure content is compliant with Accessibility Checking.
http://p.sf.net/sfu/ephox-dev2dev
_______________________________________________
TrouSerS-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/trousers-users

Reply via email to