Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Learn about layered attestation techniques for cross-domain systems through an empirical study presented by Perry Alexander from the University of Kansas at a Linux Foundation conference. Explore how to boot systems into trusted states and extend trust to runtime environments using IMA and TPM 2.0 technologies. Discover the process of booting a verified attestation manager into a measured state where it can securely access signing keys, with proof that keys can only be used when the correct attestation system makes requests in good states. Understand how signature presence on evidence creates strong binding between evidence and the attestation manager. Examine the runtime measurement and appraisal process for cross-domain systems according to Copland attestation protocols, including LKIM calls and SELinux policy verification to ensure underlying Linux systems maintain good states. Investigate the measurement of CDS components and configurations for runtime appraisal. Delve into formal verification and empirical studies of attestation systems, focusing on trust links from boot to runtime and signing key signatures. Analyze empirical studies that simulate various attack scenarios, illustrating design choices, assumptions, and system limitations in cross-domain security implementations.