Designing Trustworthy Layered Attestations

πŸ“… 2026-03-06
πŸ“ˆ Citations: 0
✨ Influential: 0
πŸ“„ PDF
πŸ€– AI Summary
Existing remote attestation mechanisms suffer from limited coverage and are vulnerable to manipulation by powerful adversaries, potentially misleading relying parties. This work proposes a hierarchical attestation architecture that incrementally gathers evidence from critical system components while enforcing architectural constraints to ensure that only trusted components influence the trust decision, thereby achieving end-to-end resilience against strong adversaries. Leveraging TPM, Linux/SELinux, and AMD SEV-SNP, we present the first structured and scalable remote attestation framework on commodity hardware and software platforms. Experimental evaluation demonstrates the scheme’s effectiveness under both standard and enhanced adversary models, with a performance overhead of only approximately 1.3%. Furthermore, our analysis identifies two key improvement pathways to address more sophisticated attacks.

Technology Category

Application Category

πŸ“ Abstract
Attestation means providing evidence that a remote target system is worthy of trust for some sensitive interaction. Although attestation is already used in network access control, security management, and trusted execution environments, it mainly concerns only a few system components. A clever adversary might manipulate these shallow attestations to mislead the relying party. Reliable attestations require layering. We construct attestations whose layers report evidence about successive components of the target system. Reliability also requires structuring the target system so only a limited set of components matters. We show how to structure an example system for reliable attestations despite a well-defined, relatively strong adversary. It is based on widely available hardware, such as Trusted Platform Modules, and software, such as Linux with SELinux. We isolate our principles in a few maxims that guide system development. We provide a cogent analysis of our mechanisms against our adversary model, as well as an empirical appraisal of the resulting system. We also identify two improvements to the mechanisms so attestation can succeed against strengthened adversaries. The performance burden of our attestation is negligible, circa 1.3 percent. After our first example, we vary our application level, and then also its underlying hardware anchor to use confidential computing with AMD's SEV-SNP. The same maxims help us achieve trustworthy attestations.
Problem

Research questions and friction points this paper is trying to address.

attestation
trustworthy systems
layered attestation
adversarial manipulation
system integrity
Innovation

Methods, ideas, or system contributions that make the work stand out.

Layered Attestation
Trusted Computing
System Structuring
Confidential Computing
Adversary-Resilient Design
πŸ”Ž Similar Papers
No similar papers found.
W
Will Thomas
The University of Kansas
L
Logan Schmalz
The University of Kansas
A
Adam Petz
The University of Kansas
Perry Alexander
Perry Alexander
AT&T Foundation Distinguished Professor, I2S Director, The University of Kansas
Formal MethodsSecurityFormal VerificationFormal SynthesisDesign Languages
J
Joshua D. Guttman
The University of Kansas
Paul D. Rowe
Paul D. Rowe
The MITRE Corporation
Formal MethodsCryptographic ProtocolsRemote AttestationComputer Security
J
James Carter
National Security Agency