A hijacker’s guide to communication interfaces of the trusted platform module

https://doi.org/10.1016/j.camwa.2012.06.018Get rights and content
Under an Elsevier user license
open archive

Abstract

In this paper, we analyze the communication of trusted platform modules and their interface to the hosting platforms. While trusted platform modules are considered to be tamper resistant, the communication channel between these modules and the rest of the trusted platform turns out to be comparatively insecure. It has been shown that passive attacks can be mounted against TPMs and their bus communication with fairly inexpensive equipment, however, similar active attacks have not been reported, yet. We pursue the idea of an active attack and show how the communication protocol of the LPC bus can be actively manipulated with basic and inexpensive equipment. Moreover, we show how our manipulations can be used to circumvent the security mechanisms, e.g. the chain of trust, provided by modern trusted platforms. In addition, we demonstrate how the proposed attack can be extended to manipulate communication buses on embedded systems.

Keywords

Trusted Computing
Trusted platform module
Simple hardware attacks
Embedded systems
Security

Cited by (0)

An earlier version of this paper, titled “A hijacker’s guide to the LPC bus” was presented at the 8th European Workshop on Public Key Infrastructures, Services and Applications (EuroPKI ’11), September 15–16, 2011 (see [8]).