A Software Integrity Authentication Protocol for Zero Trust Architecture

Wenyi Liu, Zheng Zhang, Xu Qiao, Yuanzhang Li, Yu An Tan, Weizhi Meng

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Abstract

With the rapid expansion of network scale and the increasing complexity of network infrastructure, network boundaries have gradually blurred, traditional bound-based security models have gradually become ineffective to new application environment. In the literature, zero trust security model implements continuous verification and dynamic authorization for all access requests based on multi-dimensional factors such as the identity of the access subject. To safeguard against untrusted software and vulnerabilities, it is crucial to employ diverse technologies to protect software integrity and ensure system safety. This paper focuses on the research of software integrity authentication for the zero trust network. We create a master-slave collaboration environment of host and SSD in the zero trust network, where the host CPU is the dominant CPU and the SSD CPU is the slave CPU. We then design a software integrity authentication protocol for this zero trust architecture. The protocol does not require any hardware assistance and our experimental results show that it can defend against attacks through checksum correctness and verification-time validity.
Original languageEnglish
Title of host publicationProceedings of the SIGCOMM Workshop on Zero Trust Architecture for Next Generation Communications
PublisherAssociation for Computing Machinery
Publication date2024
Pages1-6
ISBN (Electronic)979-8-4007-0715-5
DOIs
Publication statusPublished - 2024
EventACM SIGCOMM 2024 - Sydney, Australia
Duration: 4 Aug 20248 Aug 2024

Conference

ConferenceACM SIGCOMM 2024
Country/TerritoryAustralia
CitySydney
Period04/08/202408/08/2024

Keywords

  • Address Transformation
  • Authentication Protocol
  • Integrity Verification
  • Software Security
  • Zero Trust

Fingerprint

Dive into the research topics of 'A Software Integrity Authentication Protocol for Zero Trust Architecture'. Together they form a unique fingerprint.

Cite this