An AES CTR DRBG module is used to create randomly sampled addresses belonging to a user provided hex image.
Sampled data corresponding to the sampled addresses is then used to create a CMAC tag of the sampled image.
The generated tag can then be used to verify whether or not modifications have been made to the hex image,
with a certain degree of probability which depends on the size of the hex image, the modifications done
to it and the chosen scheme for the procedure.
The work on accelerating authenticated boot for embedded system resulted in designing an algorithm in python to perform the random address generation and cryptographic MAC calculation.
The Sampled Boot schemes implemented in this package allow a significant reduction of the time
needed to authenticate firmware images during startup, while still retaining a high degree of trust.
This is particularly useful for automotive applications in which startup time constraints make secure boot a time prohibitive process.
Citation for this dataset: Nasser, A., Gumise, W. (2019). Authenticated Boot Acceleration Algorithm [Code and data]. University of Michigan Deep Blue Data Repository. https://doi.org/10.7302/yeh1-1x17
|Citations to related material
- Nasser, A., Ma, D., Gumise, W.J. (2019). Accelerated Secure Boot for Realtime Embedded Safety Systems.