Proof of aliveness

C. Jin, Z. Yang, M. van Dijk, J. Zhou

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Abstract

© 2019 Association for Computing Machinery.In 2017, malware Triton was discovered in a petrol plant in Saudi Arabia, and it shut down the safety instrumented systems in the affected industrial control system without being noticed by the operators. If the malware was not discovered by a security company on time, it could leave the system running without any safety measures, and eventually lead to an explosion. To detect such attacks, one can track the running status of the devices in the field to know that they are still “alive”. However, in practice, there yet does not exist an efficient and cryptographically secure mechanism/ protocol that can prove the aliveness of a device to control centers over an open network. This paper aims to tackle this practical problem by introducing a new cryptographic notion called Proof of Aliveness (PoA). We propose to use a one-way function (OWF) chain structure to build an efficient proof of aliveness, such that the prover sends every node on the OWF chain in a reverse order periodically, and it can be verified by a verifier with the possession of the tail (last node) of the OWF chain. However, the practicality of this construction is limited by the finite number of nodes on an OWF chain. We enhance our first PoA construction by linking multiple OWF chains together using a pseudo-random generator chain. By integrating one-time signature schemes into the structure, we can achieve auto-replenishment of aliveness-proofs, which implies that this PoA can be used forever without an interruption for reinitialization. To make our proposals more practical, we analyzed the security of the above PoA proposals in the standard model. Besides that, we also specifically defined a security model for the concept of PoA. Our PoA constructions are implemented and evaluated on Raspberry Pis for a demonstration of its performance.
Original languageEnglish
Title of host publicationProceedings - 35th Annual Computer Security Applications Conference, ACSAC 2019
PublisherAssociation for Computing Machinery
Pages1-16
ISBN (Electronic)9781450376280
DOIs
Publication statusPublished - 9 Dec 2019
Externally publishedYes
Event35th Annual Computer Security Applications Conference, ACSAC 2019 - San Juan, United States
Duration: 9 Dec 201913 Dec 2019

Conference

Conference35th Annual Computer Security Applications Conference, ACSAC 2019
Country/TerritoryUnited States
CitySan Juan
Period9/12/1913/12/19

Funding

We would like to thank our shepherd, Yupeng Zhang, and the anonymous reviewers for their helpful comments. This work was supported by the National Research Foundation (NRF), Prime Ministers Office, Singapore, under its National Cybersecurity R&D Programme (Award No. NRF2014NCR-NCR001-31) and administered by the National Cybersecurity R&D Directorate. Marten van Dijk was partially supported by AFOSR MURI under award number FA9550-14-1-0351. Chenglu Jin’s work was done during his internship in SUTD supported by the SUTD start-up research grant SRG-ISTD-2017-124.

FundersFunder number
Prime Ministers Office, SingaporeNRF2014NCR-NCR001-31
Air Force Office of Scientific ResearchFA9550-14-1-0351
National Research Foundation
Singapore University of Technology and DesignSRG-ISTD-2017-124

    Fingerprint

    Dive into the research topics of 'Proof of aliveness'. Together they form a unique fingerprint.

    Cite this