Remote attestation is an important technique for establishing trust in distributed or network systems and the key part of the trusted computing proposed by TCG.In addition to establishing trust among parties involved in the attesta-tion process
protecting the privacy of participating parties is one of the necessary conditions that remote attestation is widely accepted by stake-holders.Property-based attestation is proposed and a widely accepted scheme for this purpose.However
property-based attestation doesn’t intrinsically preserve the configuration privacy of attestation platform.In fact
the capability of protecting privacy is relevant to the construction of property-based attestation and the measure-ments that the adversary can take to compromise such protection.Three possible measurements were presented that a ma-licious verifier could take to analyze the configuration privacy of the attestation platform.And then the characteristics and limitations of these methods were discussed
which offered reference for the further research on property-based remote attestation.