Formal Analysis of SPDM: Security Protocol and Data Model version 1.2

Authors: 

Cas Cremers, Alexander Dax, and Aurora Naska, CISPA Helmholtz Center for Information Security

Abstract: 

DMTF is a standards organization by major industry players in IT infrastructure including AMD, Alibaba, Broadcom, Cisco, Dell, Google, Huawei, IBM, Intel, Lenovo, and NVIDIA, which aims to enable interoperability, e.g., including cloud, virtualization, network, servers and storage. It is currently standardizing a security protocol called SPDM, which aims to secure communication over the wire and to enable device attestation, notably also explicitly catering for communicating hardware components.

The SPDM protocol inherits requirements and design ideas from IETF’s TLS 1.3. However, its state machines and transcript handling are substantially different and more complex. While architecture, specification, and open-source libraries of the current versions of SPDM are publicly available, these include no significant security analysis of any kind.

In this work we develop the first formal models of the three modes of the SPDM protocol version 1.2.1, and formally analyze their main security properties.

Open Access Media

USENIX is committed to Open Access to the research presented at our events. Papers and proceedings are freely available to everyone once the event begins. Any video, audio, and/or slides that are posted after the event are also free and open to everyone. Support USENIX and our commitment to Open Access.

BibTeX
@inproceedings {287366,
author = {Cas Cremers and Alexander Dax and Aurora Naska},
title = {Formal Analysis of {SPDM}: Security Protocol and Data Model version 1.2},
booktitle = {32nd USENIX Security Symposium (USENIX Security 23)},
year = {2023},
isbn = {978-1-939133-37-3},
address = {Anaheim, CA},
pages = {6611--6628},
url = {https://www.usenix.org/conference/usenixsecurity23/presentation/cremers-spdm},
publisher = {USENIX Association},
month = aug
}

Presentation Video