A very recent use case where attestation is used is in Intel SGX <https://www.intel.com/content/www/us/en/developer/tools/software-guard-extensions/attestation-services.html>. SGX is used on some Intel servers where the data in compute needs to be secure. Another example is TPM <https://en.wikipedia.org/wiki/Trusted_Platform_Module>, extensively used in Windows machines <https://learn.microsoft.com/en-us/windows/security/information-protection/tpm/trusted-platform-module-overview> .
We plan to implement similar functionalities on embedded platforms with formal guarantees. Especially on ARM-based processors, such as Sabrelite. Hope this helps. Please let me know if you have any further questions. On Wed, Jan 25, 2023 at 4:09 PM Zenaan Harkness <zen...@gmail.com> wrote: > Thank you for that explanation of the attestion process, I appreciate > your clairty. > > Do you have a real world use case you can share please? > > Thank you, > Zenaan > > > On 1/26/23, Sashidhar Jakkamsetti <sjakk...@uci.edu> wrote: > > Say we have two actors: (1) the device, aka prover, installed with sel4 > and > > our attestation service, and (2) the device owner, aka, the verifier. > > > > Verifier decides what applications can run on the prover. For example, > > there are two applications: app1 and app2. Once configured, the verifier > > deploys the prover at a remote location. Now when the verifier wants to > > connect to app1 to request a service, it sends an attestation request to > > our attestation process to check the status of app1, i.e., whether app1 > is > > running and in good condition. As a response to the request, the verifier > > gets a signature indicating that app1 is alive and healthy, and also an > > encryption key that the verifier can use to further communicate with > app1. > > Similarly, the same goes for app2. > > > > We imagine attestation to be implemented like this: signature_app1 = > > ECDSA{signing_key, nonce, SHA2(binary_of_app1) || > > SHA2(encryption_key_of_app1)}, where signing_key is the secret key of the > > attestation process. > > > > On Wed, Jan 25, 2023 at 2:05 PM Zenaan Harkness <zen...@gmail.com> > wrote: > > > >> On 1/26/23, Sashidhar Jakkamsetti <sjakk...@uci.edu> wrote: > >> > To briefly introduce what we are working on: We aim to build a remote > >> > attestation service for the processes running atop seL4, and for that, > >> > we > >> > are planning to spawn a separate (formally-verified) process that > >> > handles > >> > attestation. This attestation process needs to be high-assurance for > >> > obvious reasons because it contains a secret key that is used for > >> > implementing digital signatures. For more details on this, please > refer > >> to > >> > one of our old papers: > >> > https://urldefense.com/v3/__https://arxiv.org/pdf/1703.02688.pdf__;!!CzAuKJ42GuquVTTmVmPViYEvSg!MA5pHf44ldA_BWFsksG1ou1IZJsfVWAMEgU-cxBxDv0S3tCBHhker7rDkzkpkDqOq2rN_UsgK0qEqw$ > >> , > >> > which discusses a basic version of attestation (but without formal > >> > guarantees though). > >> > >> Please briefly describe the use case for this implementation. > >> > >> Thank you, > >> Zenaan > >> > > > > > > -- > > Sashidhar Jakkamsetti > > University of California Irvine, Ph.D. > > https://sites.uci.edu/sashidharjakkamsetti/ > > > -- Sashidhar Jakkamsetti University of California Irvine, Ph.D. https://sites.uci.edu/sashidharjakkamsetti/ _______________________________________________ Devel mailing list -- devel@sel4.systems To unsubscribe send an email to devel-leave@sel4.systems