Bootstrapping Trust in Modern Computers
Title | Bootstrapping Trust in Modern Computers PDF eBook |
Author | Bryan Parno |
Publisher | Springer Science & Business Media |
Pages | 113 |
Release | 2011-08-27 |
Genre | Computers |
ISBN | 1461414601 |
Trusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer's state. We examine research on securely capturing a computer's state, and consider the utility of this information both for improving security on the local computer (e.g., to convince the user that her computer is not infected with malware) and for communicating a remote computer's state (e.g., to enable the user to check that a web server will adequately protect her data). Although the recent "Trusted Computing" initiative has drawn both positive and negative attention to this area, we consider the older and broader topic of bootstrapping trust in a computer. We cover issues ranging from the wide collection of secure hardware that can serve as a foundation for trust, to the usability issues that arise when trying to convey computer state information to humans. This approach unifies disparate research efforts and highlights opportunities for additional work that can guide real-world improvements in computer security.
Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers
Title | Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers PDF eBook |
Author | Bryan Jeffrey Parno |
Publisher | Morgan & Claypool Publishers |
Pages | 177 |
Release | 2014-06-01 |
Genre | Computers |
ISBN | 1627054790 |
As society rushes to digitize sensitive information and services, it is imperative to adopt adequate security protections. However, such protections fundamentally conflict with the benefits we expect from commodity computers. In other words, consumers and businesses value commodity computers because they provide good performance and an abundance of features at relatively low costs. Meanwhile, attempts to build secure systems from the ground up typically abandon such goals, and hence are seldom adopted. In this book, I argue that we can resolve the tension between security and features by leveraging the trust a user has in one device to enable her to securely use another commodity device or service, without sacrificing the performance and features expected of commodity systems. At a high level, we support this premise by developing techniques to allow a user to employ a small, trusted, portable device to securely learn what code is executing on her local computer. Rather than entrusting her data to the mountain of buggy code likely running on her computer, we construct an on-demand secure execution environment which can perform security-sensitive tasks and handle private data in complete isolation from all other software (and most hardware) on the system. Meanwhile, non-security-sensitive software retains the same abundance of features and performance it enjoys today. Having established an environment for secure code execution on an individual computer, we then show how to extend trust in this environment to network elements in a secure and efficient manner. This allows us to reexamine the design of network protocols and defenses, since we can now execute code on endhosts and trust the results within the network. Lastly, we extend the user's trust one more step to encompass computations performed on a remote host (e.g., in the cloud). We design, analyze, and prove secure a protocol that allows a user to outsource arbitrary computations to commodity computers run by an untrusted remote party (or parties) who may subject the computers to both software and hardware attacks. Our protocol guarantees that the user can both verify that the results returned are indeed the correct results of the specified computations on the inputs provided, and protect the secrecy of both the inputs and outputs of the computations. These guarantees are provided in a non-interactive, asymptotically optimal (with respect to CPU and bandwidth) manner. Thus, extending a user's trust, via software, hardware, and cryptographic techniques, allows us to provide strong security protections for both local and remote computations on sensitive data, while still preserving the performance and features of commodity computers.
Computer Security – ESORICS 2017
Title | Computer Security – ESORICS 2017 PDF eBook |
Author | Simon N. Foley |
Publisher | Springer |
Pages | 573 |
Release | 2017-09-01 |
Genre | Computers |
ISBN | 3319663992 |
The two-volume set, LNCS 10492 and LNCS 10493 constitutes the refereed proceedings of the 22nd European Symposium on Research in Computer Security, ESORICS 2017, held in Oslo, Norway, in September 2017. The 54 revised full papers presented were carefully reviewed and selected from 338 submissions. The papers address issues such as data protection; security protocols; systems; web and network security; privacy; threat modeling and detection; information flow; and security in emerging applications such as cryptocurrencies, the Internet of Things and automotive.
Smart Computing and Informatics
Title | Smart Computing and Informatics PDF eBook |
Author | Suresh Chandra Satapathy |
Publisher | Springer |
Pages | 646 |
Release | 2017-10-28 |
Genre | Technology & Engineering |
ISBN | 9811055475 |
This volume contains 68 papers presented at SCI 2016: First International Conference on Smart Computing and Informatics. The conference was held during 3-4 March 2017, Visakhapatnam, India and organized communally by ANITS, Visakhapatnam and supported technically by CSI Division V – Education and Research and PRF, Vizag. This volume contains papers mainly focused on smart computing for cloud storage, data mining and software analysis, and image processing.
Applied Cryptography and Network Security
Title | Applied Cryptography and Network Security PDF eBook |
Author | Mark Manulis |
Publisher | Springer |
Pages | 667 |
Release | 2016-06-09 |
Genre | Computers |
ISBN | 3319395556 |
This book constitutes the refereed proceedings of the 14th International Conference on Applied Cryptography and Network Security, ACNS 2016, held in Guildford, UK. in June 2016. 5. The 35 revised full papers included in this volume and presented together with 2 invited talks, were carefully reviewed and selected from 183 submissions.ACNS is an annual conference focusing on innovative research and current developments that advance the areas of applied cryptography, cyber security and privacy.
Security Protocols XXIII
Title | Security Protocols XXIII PDF eBook |
Author | Bruce Christianson |
Publisher | Springer |
Pages | 377 |
Release | 2015-11-24 |
Genre | Computers |
ISBN | 3319260960 |
This book constitutes the thoroughly refereed post-workshop proceedings of the 23rd International Workshop on Security Protocols, held in Cambridge, UK, in March/April 2015. After an introduction the volume presents 18 revised papers each followed by a revised transcript of the presentation and ensuing discussion at the event. The theme of this year's workshop is "Information Security in Fiction and in Fact".
Emerging Research in Computing, Information, Communication and Applications
Title | Emerging Research in Computing, Information, Communication and Applications PDF eBook |
Author | N. R. Shetty |
Publisher | Springer |
Pages | 684 |
Release | 2016-05-09 |
Genre | Technology & Engineering |
ISBN | 9811002878 |
This proceedings volume covers the proceedings of ERCICA 2015. ERCICA provides an interdisciplinary forum for researchers, professional engineers and scientists, educators, and technologists to discuss, debate and promote research and technology in the upcoming areas of Computing, Information, Communication and their Applications. The contents of this book cover emerging research areas in fields of Computing, Information, Communication and Applications. This will prove useful to both researchers and practicing engineers.