
Trust and Trustworthy Computing
Beschreibung
This book constitutes the refereed proceedings of the 4th International Conference on Trust and Trustworthy Computing, TRUST 2011, held in Pittsburgh, PA, USA in June 2011.
The 23 revised full papers presented were carefully reviewed and selected for inclusion in the book. The papers are organized in technical sessions on cloud and virtualization, physically unclonable functions, mobile device security, socio-economic aspects of trust, hardware trust, access control, privacy, trust aspects of routing, and cryptophysical protocols.
Weitere Details
Weitere Ausgaben
Inhalt
- Title
- Preface
- Organization
- Table of Contents
- Session 1: Cloud and Virtualization
- Verifying Trustworthiness of Virtual Appliances in Collaborative Environments
- Introduction
- Motivational Case Study
- Paper Contributions and Structure
- Requirements
- What Information Should Be Logged?
- Assumptions
- Overview of the Trustworthiness Verification Process
- Whitelist as a Repository of Specifications
- Specification of the Whitelist Schema
- Specification Generation
- Trace Analysis-Based Trustworthiness Verification
- Trace-Process Transformation
- System Abstractions
- Process Model Conformance to Infrastructure Model
- Refinements against the Whitelist
- Experiment
- CSP Implementation of the Generator
- Extracted Processes
- Verification and Results
- Observations
- Satisfying the Requirements
- Advantages over Traditional Whitelisting
- Limitations of Common Log Files
- Custom Applications
- Generalisation of Our Method
- Related Work
- Conclusions and Future Work
- References
- Towards a Trustworthy, Lightweight Cloud Computing Framework for Embedded Systems
- Introduction
- Our Contribution
- Related Work
- Concept and Architecture Overview
- Reducing the Visible System Surface
- Monitoring and Filtering System Calls
- Simple Capabilities for compartments
- Trust Establishment
- ARM TrustZone
- Dedicated Micro-controller
- Support for Privacy Protection
- Trust Layer
- Prototype Implementation and Test Setup
- Tiny Hardware Reference Platform
- MHigh-End Mobile Phone Reference Platform
- Prototype Software Implementation
- Pre-filtered System Call Monitoring
- Prototype Results
- Conclusion
- References
- Session 2: Physically Unclonable Functions
- Side-Channel Analysis of PUFs and Fuzzy Extractors
- Introduction
- Related Work
- Background
- Selected PUF Constructions
- Fuzzy Extractors
- Side-Channel Analysis
- Potential Side-Channels of PUFs
- Arbiter PUFs
- Ring Oscillator PUFs
- Integrated Optical PUFs
- A Note on Invasive Attacks
- Side-Channel Attacks on Fuzzy Extractors
- Toeplitz Hashing Side-Channel Analysis (TH-SCA)
- Code-Offset Side-Channel Analysis (CO-SCA)
- Vulnerable Error-Correcting Codes
- Implementation of TH-SCA
- FPGA Prototype
- Measurements
- Processing and Analysis
- Results
- Conclusion
- References
- Coalition Resistant Anonymous Broadcast Encryption Scheme Based on PUF
- Introduction
- PUF Based Broadcast Encryption Scheme
- Preliminaries
- Lagrangian Interpolation
- Revocation via Lagrangian Interpolation
- PUF-Based BE
- Scheme Overview
- Scheme Details
- Security Analysis
- PUF Based Broadcasting System - An Example
- Building Blocks
- Sketch of the System
- Escaping Revocation via Collusion
- Conclusions
- References
- A Practical Device Authentication Scheme Using SRAM PUFs
- Introduction
- Related Work
- Our Contribution
- Organization of the Paper
- Physically Unclonable Functions
- Our Off-Line Authentication Scheme
- Our Basic Scheme
- A PUF Simulation Attack on the Basic Authentication Scheme
- Our Full Authentication Scheme Using SRAM PUF
- Discussion and Analysis
- Probability and Security Analysis
- Practical Aspects of Our Scheme
- Conclusion and Future Work
- References
- Session 3: Mobile Device Security
- Practical Property-Based Attestation on Mobile Devices
- Introduction
- Assumptions and Objectives
- Attestation Scheme
- Attestation Protocol
- Attestation Protocol for MTM TrEEs
- Implementation
- Analysis
- Related Work
- Summary
- References
- Taming Information-Stealing Smartphone Applications (on Android)
- Introduction
- Design of TISSA
- Design Requirements and Threat Model
- System Design
- Implementation
- Privacy Setting Content Provider
- Privacy Setting Manager
- Privacy-Aware Components
- Evaluation
- Effectiveness
- Performance
- Discussion
- Related Work
- Conclusion
- References
- Towards Permission-Based Attestation for the Android Platform
- Introduction
- Android
- Permission-Based Attestation
- Architecture Overview
- Steps to Perform Permission-Based Attestation
- Conclusion and Future Work
- References
- Session 4: Socio-Economic Aspects of Trust
- Trusting to Learn: Trust and Privacy Issues in Serious Games
- Methodology
- Participants
- TARGET Demo Video
- Scenarios
- Procedure
- Findings
- Players' Interaction with the System
- Interactions with Other Stakeholders
- Player-Manager Interaction
- Player-Player Interaction
- Discussion
- Conclusions and Recommendations
- References
- Modifying Trust Dynamics through Cooperation and Defection in Evolving Social Networks
- Introduction
- Related Work
- Model Description
- Node Setup
- Node Choice
- Personal State Update
- Trust
- Metrics
- Network Simulations
- Node Cooperation and Defection
- Conclusions
- References
- Who Is Concerned about What? A Study of American, Chinese and Indian Users' Privacy Concerns on Social Network Sites
- Introduction
- Survey
- SNS Sites and Respondents
- Survey Design
- Survey Administration
- Data Cleaning and Analysis
- Survey Results
- Demographics
- Privacy Attitudes of Personal Content on SNS
- Privacy Concerns on SNS
- Trust in SNS System or Operator
- Desire to Restrict Information on SNS
- Fake Names and Impersonation
- Discussion
- References
- Session 5: Hardware Trust
- Systematic Security Assessment at an Early Processor Design Stage
- Introduction
- Processor Design and Security Review Process
- Today's Process
- Limitations of Today's Security Review Process
- Security Assessment Scheme
- Goals
- Development Approach
- Overall Structure
- Security Review Process with the Proposed Scheme
- Representative Questions
- Tripwire Questions
- Detailed Questions
- Case Studies
- Nehalem
- Next Generation Processor
- Strengths and Limitations
- Related Work
- Conclusion
- References
- CPU Support for Secure Executables
- Introduction
- Model
- Approach
- Integrity Tree
- System Calls
- Other Considerations
- Implementation
- Conclusion
- References
- Extracting Device Fingerprints from Flash Memory by Exploiting Physical Variations
- Introduction
- Applications
- Counterfeit Detection
- Device Identification
- Random Number Generation
- Flash Memory
- Flash Cells
- Array Organization
- Variation Mechanisms
- Techniques
- Data Collection Hardware
- Evaluating FPUFs
- Program Disturb
- Read Disturb
- Program Operation Latency
- Other Potential Signatures
- Summary
- Related Work
- Conclusion
- References
- Enforcing Executing-Implies-Verified with the Integrity-Aware Processor
- Introduction
- Design
- Threat Model
- Hardware
- Networking
- XIVE Kernel
- Discussion
- Evaluation
- Related Work
- Conclusion
- References
- Session 6: Access Control
- Home-Network Threats and Access Controls
- Introduction
- The Security of Unmanaged Networks
- Assets and Risks
- Threats and Attacks
- The Risks of Access Controls
- Other Sources of Risk
- Security Principles for Home Networks
- Least Privilege
- Strong Identification and Authentication
- Summary: Three Levels of Privilege
- UPnP Device Protection
- Authorization Levels
- Device Pairing
- TLS and X.509 v3 Digital Certificates
- Peer-to-Peer Operation
- The Security of Device Protection
- Prior Work
- Conclusion
- References
- Contego: Capability-Based Access Control for Web Browsers
- Introduction
- Capability for Browsers
- Capabilities
- Binding of Capabilities
- Capability Enforcement
- Ensuring Security
- Implementation
- System Overview
- HTML-Induced Actions
- Javascript-Induced Actions
- Event-Driven Actions
- Performance Overhead
- Conclusion and Future Work
- References
- Session 7: Privacy
- Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information
- Introduction
- Preliminaries
- PPSSI Syntax and Notation
- Adversary Model
- Privacy Requirements
- Private Set Intersection (PSI)
- Related Work
- A Strawman Approach
- PPSSI Design
- Architecture
- Database Encryption with Counters
- Query Lookup
- Challenges Revisited
- Discussion
- Performance Evaluation
- Conclusion
- References
- CertainLogic: A Logic for Modeling Trust and Uncertainty
- Introduction
- Related Work
- Use Case
- CertainLogic
- CertainTrust - Representation
- Logical Operators
- Evaluation of the Use Case
- Conclusion
- References
- Session 8: Trust Issues in Routing
- AS-TRUST: A Trust Quantification Scheme for Autonomous Systems in BGP
- Introduction
- Preliminaries
- The Border Gateway Protocol
- Problem Statement and Approach
- Experiment Setup
- AS-TRUST Reputation Computation
- BGP Service
- Behavior Evaluation
- Feedback Mechanism
- BGP Service Evaluation and Feedback
- Evaluation of Service Using Bp
- Evaluation of Service Using Bo
- Evaluation of Service Using Bl
- Reputation Computation
- Reputation Computation
- Reputation Analysis
- Related Work
- Conclusions
- References
- Incentivizing Responsible Networking via Introduction-Based Routing
- Introduction
- Introduction-Based Routing
- IBR Protocol
- An Introduction Sequence
- Reputation
- Deployment
- Network Performance Evaluation
- Experiment Settings
- Results
- Reputation Attacks
- Discussion
- Empirical Game Evaluation
- Game Formulation
- Experiment Settings
- Single Introducer
- Network of Introducers
- Remarks
- Related Work
- Conclusion
- References
- Session 9: Crypto-Physical Protocols
- Catching the Cuckoo: Verifying TPM Proximity Using a Quote Timing Side-Channel
- Introduction
- Security and Timing Model
- Previous and Related Work
- Protocol
- Experiments
- OS to TPM
- OS to Smart Card
- Analysis
- Results and Conclusions
- Future Work
- References
- Group Distance Bounding Protocols
- Introduction
- Preliminaries
- Overview of Distance Bounding (DB)
- Problem Statement and System Model
- Passive DB
- One-Way DB Extended to Group Settings
- GDB Performance and Security Analysis
- Performance
- Security with Trusted Verifiers
- Security Untrusted Active Verifiers
- Combined Passive/Active DB Security
- Related Work
- Discussion and Conclusion
- References
- Author Index
Systemvoraussetzungen
Dateiformat: PDF
Kopierschutz: Wasserzeichen-DRM (Digital Rights Management)
Systemvoraussetzungen:
- Computer (Windows; MacOS X; Linux): Verwenden Sie zum Lesen die kostenlose Software Adobe Reader, Adobe Digital Editions oder einen anderen PDF-Viewer Ihrer Wahl (siehe E-Book Hilfe).
- Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions oder die App PocketBook (siehe E-Book Hilfe).
- E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m.
Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Wasserzeichen-DRM wird hier ein „weicher” Kopierschutz verwendet. Daher ist technisch zwar alles möglich – sogar eine unzulässige Weitergabe. Aber an sichtbaren und unsichtbaren Stellen wird der Käufer des E-Books als Wasserzeichen hinterlegt, sodass im Falle eines Missbrauchs die Spur zurückverfolgt werden kann.
Weitere Informationen finden Sie in unserer E-Book Hilfe.