Bootstrapping Trust in Modern Computers

Bootstrapping Trust in Modern Computers
Title Bootstrapping Trust in Modern Computers PDF eBook
Author Bryan Parno
Publisher Springer Science & Business Media
Pages 113
Release 2011-08-27
Genre Computers
ISBN 1461414601

Download Bootstrapping Trust in Modern Computers Book in PDF, Epub and Kindle

Trusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer's state. We examine research on securely capturing a computer's state, and consider the utility of this information both for improving security on the local computer (e.g., to convince the user that her computer is not infected with malware) and for communicating a remote computer's state (e.g., to enable the user to check that a web server will adequately protect her data). Although the recent "Trusted Computing" initiative has drawn both positive and negative attention to this area, we consider the older and broader topic of bootstrapping trust in a computer. We cover issues ranging from the wide collection of secure hardware that can serve as a foundation for trust, to the usability issues that arise when trying to convey computer state information to humans. This approach unifies disparate research efforts and highlights opportunities for additional work that can guide real-world improvements in computer security.

Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers

Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers
Title Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers PDF eBook
Author Bryan Jeffrey Parno
Publisher Morgan & Claypool Publishers
Pages 177
Release 2014-06-01
Genre Computers
ISBN 1627054790

Download Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers Book in PDF, Epub and Kindle

As society rushes to digitize sensitive information and services, it is imperative to adopt adequate security protections. However, such protections fundamentally conflict with the benefits we expect from commodity computers. In other words, consumers and businesses value commodity computers because they provide good performance and an abundance of features at relatively low costs. Meanwhile, attempts to build secure systems from the ground up typically abandon such goals, and hence are seldom adopted. In this book, I argue that we can resolve the tension between security and features by leveraging the trust a user has in one device to enable her to securely use another commodity device or service, without sacrificing the performance and features expected of commodity systems. At a high level, we support this premise by developing techniques to allow a user to employ a small, trusted, portable device to securely learn what code is executing on her local computer. Rather than entrusting her data to the mountain of buggy code likely running on her computer, we construct an on-demand secure execution environment which can perform security-sensitive tasks and handle private data in complete isolation from all other software (and most hardware) on the system. Meanwhile, non-security-sensitive software retains the same abundance of features and performance it enjoys today. Having established an environment for secure code execution on an individual computer, we then show how to extend trust in this environment to network elements in a secure and efficient manner. This allows us to reexamine the design of network protocols and defenses, since we can now execute code on endhosts and trust the results within the network. Lastly, we extend the user's trust one more step to encompass computations performed on a remote host (e.g., in the cloud). We design, analyze, and prove secure a protocol that allows a user to outsource arbitrary computations to commodity computers run by an untrusted remote party (or parties) who may subject the computers to both software and hardware attacks. Our protocol guarantees that the user can both verify that the results returned are indeed the correct results of the specified computations on the inputs provided, and protect the secrecy of both the inputs and outputs of the computations. These guarantees are provided in a non-interactive, asymptotically optimal (with respect to CPU and bandwidth) manner. Thus, extending a user's trust, via software, hardware, and cryptographic techniques, allows us to provide strong security protections for both local and remote computations on sensitive data, while still preserving the performance and features of commodity computers.

Computer Security – ESORICS 2017

Computer Security – ESORICS 2017
Title Computer Security – ESORICS 2017 PDF eBook
Author Simon N. Foley
Publisher Springer
Pages 573
Release 2017-09-01
Genre Computers
ISBN 3319663992

Download Computer Security – ESORICS 2017 Book in PDF, Epub and Kindle

The two-volume set, LNCS 10492 and LNCS 10493 constitutes the refereed proceedings of the 22nd European Symposium on Research in Computer Security, ESORICS 2017, held in Oslo, Norway, in September 2017. The 54 revised full papers presented were carefully reviewed and selected from 338 submissions. The papers address issues such as data protection; security protocols; systems; web and network security; privacy; threat modeling and detection; information flow; and security in emerging applications such as cryptocurrencies, the Internet of Things and automotive.

Smart Computing and Informatics

Smart Computing and Informatics
Title Smart Computing and Informatics PDF eBook
Author Suresh Chandra Satapathy
Publisher Springer
Pages 646
Release 2017-10-28
Genre Technology & Engineering
ISBN 9811055475

Download Smart Computing and Informatics Book in PDF, Epub and Kindle

This volume contains 68 papers presented at SCI 2016: First International Conference on Smart Computing and Informatics. The conference was held during 3-4 March 2017, Visakhapatnam, India and organized communally by ANITS, Visakhapatnam and supported technically by CSI Division V – Education and Research and PRF, Vizag. This volume contains papers mainly focused on smart computing for cloud storage, data mining and software analysis, and image processing.

Applied Cryptography and Network Security

Applied Cryptography and Network Security
Title Applied Cryptography and Network Security PDF eBook
Author Mark Manulis
Publisher Springer
Pages 667
Release 2016-06-09
Genre Computers
ISBN 3319395556

Download Applied Cryptography and Network Security Book in PDF, Epub and Kindle

This book constitutes the refereed proceedings of the 14th International Conference on Applied Cryptography and Network Security, ACNS 2016, held in Guildford, UK. in June 2016. 5. The 35 revised full papers included in this volume and presented together with 2 invited talks, were carefully reviewed and selected from 183 submissions.ACNS is an annual conference focusing on innovative research and current developments that advance the areas of applied cryptography, cyber security and privacy.

Security Protocols XXIII

Security Protocols XXIII
Title Security Protocols XXIII PDF eBook
Author Bruce Christianson
Publisher Springer
Pages 377
Release 2015-11-24
Genre Computers
ISBN 3319260960

Download Security Protocols XXIII Book in PDF, Epub and Kindle

This book constitutes the thoroughly refereed post-workshop proceedings of the 23rd International Workshop on Security Protocols, held in Cambridge, UK, in March/April 2015. After an introduction the volume presents 18 revised papers each followed by a revised transcript of the presentation and ensuing discussion at the event. The theme of this year's workshop is "Information Security in Fiction and in Fact".

Emerging Research in Computing, Information, Communication and Applications

Emerging Research in Computing, Information, Communication and Applications
Title Emerging Research in Computing, Information, Communication and Applications PDF eBook
Author N. R. Shetty
Publisher Springer
Pages 684
Release 2016-05-09
Genre Technology & Engineering
ISBN 9811002878

Download Emerging Research in Computing, Information, Communication and Applications Book in PDF, Epub and Kindle

This proceedings volume covers the proceedings of ERCICA 2015. ERCICA provides an interdisciplinary forum for researchers, professional engineers and scientists, educators, and technologists to discuss, debate and promote research and technology in the upcoming areas of Computing, Information, Communication and their Applications. The contents of this book cover emerging research areas in fields of Computing, Information, Communication and Applications. This will prove useful to both researchers and practicing engineers.