Using Sigsum Logs to Detect Malicious and Unintended Key-Usage
09-20, 15:30–16:00 (Europe/Stockholm), Main Room

How do you know that your signing key is not being used for malicious purposes?
For example, a compromised key can be used to distribute firmware that contains
malware or to forge TPM quotes. The short answer is that it is difficult to
detect this type of compromise. Unless your key-usage is transparent enough,
you have no consize view of the signatures that an end-user may encounter.

Meet Sigsum, a free and open source software project that brings transparency to
signed checksums. The goal is to detect every signature that an end-user
accepts as valid. This goal is achieved using a minimal transparency log
design that can be used as a building block to secure the supply chain and more.
For security, we rely on standard cryptographic assumptions and an attacker that
cannot control more than m-of-n independent parties. Throughout the talk you
will learn more about Sigsum's approach towards transparency logs.

See also: Slides (2.6 MB)

Rasmus Dahlberg is a PhD student and a software engineer that works on transparent, verifiable, and privacy-preserving systems.