Cryptology ePrint Archive: Report 2017/648
CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds
Kirill Nikitin and Eleftherios Kokoris-Kogias and Philipp Jovanovic and Linus Gasser and Nicolas Gailly and Ismail Khoffi and Justin Cappos and Bryan Ford
Abstract: Software-update mechanisms are critical to the security of modern systems,
but their typically centralized design presents
a lucrative and frequently attacked target. In this work, we propose
CHAINIAC, a decentralized software-update framework that eliminates single points of failure, enforces transparency, and provides
efficient verifiability of integrity and authenticity for software-release processes.
Independent $\textit{witness servers}$ collectively verify
conformance of software updates to release policies,
$\textit{build verifiers}$ validate the source-to-binary correspondence, and a
tamper-proof release log
stores collectively signed updates, thus ensuring
that no release is accepted by clients
before being widely disclosed and validated.
The release log embodies a $\textit{skipchain}$, a novel data structure,
enabling arbitrarily out-of-date clients to efficiently validate updates and signing keys.
Evaluation of our CHAINIAC prototype on reproducible Debian packages
shows that the automated update process takes the average of 5 minutes
per release for individual packages, and only 20 seconds for the aggregate timeline.
We further evaluate the framework using real-world
data from the PyPI package repository and show that it
offers clients security comparable to verifying every single update themselves
while consuming only one-fifth of the bandwidth and having a minimal
computational overhead.
Category / Keywords: applications / system security, software updates, decentralization
Original Publication (in the same form): Proceedings of the 26th USENIX Conference on Security Symposium
Date: received 30 Jun 2017
Contact author: kirill nikitin at epfl ch
Available format(s): PDF | BibTeX Citation
Version: 20170705:212210 (All versions of this report)
Short URL: ia.cr/2017/648
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]