Bootstrapping Trust in Modern Computers

Bootstrapping Trust in Modern Computers

Trusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer's state. We examine research on securely capturing a computer's state, and consider the utility of this information both for improving security on the local computer (e.g., to convince the user that her computer is not infected with malware) and for communicating a remote computer's state (e.g., to enable the user to check that a web server will adequately protect her data). Although the recent "Trusted Computing" initiative has drawn both positive and negative attention to this area, we consider the older and broader topic of bootstrapping trust in a computer. We cover issues ranging from the wide collection of secure hardware that can serve as a foundation for trust, to the usability issues that arise when trying to convey computer state information to humans. This approach unifies disparate research efforts and highlights opportunities for additional work that can guide real-world improvements in computer security.


Author
Publisher Springer Science & Business Media
Release Date
ISBN 1461414601
Pages 101 pages
Rating 4/5 (05 users)
Read More

More Books:

Bootstrapping Trust in Modern Computers
Language: en
Pages: 101
Authors: Bryan Parno
Categories: Computers
Type: BOOK - Published: 2011-08-27 - Publisher: Springer Science & Business Media

Trusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer's state. We
Applied Cryptography and Network Security
Language: en
Pages: 668
Authors: Mark Manulis
Categories: Computers
Type: BOOK - Published: 2016-06-09 - Publisher: Springer

This book constitutes the refereed proceedings of the 14th International Conference on Applied Cryptography and Network Security, ACNS 2016, held in Guildford,
Computer Security – ESORICS 2017
Language: en
Pages: 573
Authors: Simon N. Foley
Categories: Computers
Type: BOOK - Published: 2017-09-01 - Publisher: Springer

The two-volume set, LNCS 10492 and LNCS 10493 constitutes the refereed proceedings of the 22nd European Symposium on Research in Computer Security, ESORICS 2017
Smart Computing and Informatics
Language: en
Pages: 653
Authors: Suresh Chandra Satapathy
Categories: Technology & Engineering
Type: BOOK - Published: 2017-10-28 - Publisher: Springer

This volume contains 68 papers presented at SCI 2016: First International Conference on Smart Computing and Informatics. The conference was held during 3-4 Marc
Security Protocols XXIII
Language: en
Pages: 367
Authors: Bruce Christianson
Categories: Computers
Type: BOOK - Published: 2015-11-24 - Publisher: Springer

This book constitutes the thoroughly refereed post-workshop proceedings of the 23rd International Workshop on Security Protocols, held in Cambridge, UK, in Marc
Emerging Research in Computing, Information, Communication and Applications
Language: en
Pages: 701
Authors: N. R. Shetty
Categories: Technology & Engineering
Type: BOOK - Published: 2016-05-09 - Publisher: Springer

This proceedings volume covers the proceedings of ERCICA 2015. ERCICA provides an interdisciplinary forum for researchers, professional engineers and scientists
On the Learnability of Physically Unclonable Functions
Language: en
Pages: 86
Authors: Fatemeh Ganji
Categories: Technology & Engineering
Type: BOOK - Published: 2018-03-24 - Publisher: Springer

This book addresses the issue of Machine Learning (ML) attacks on Integrated Circuits through Physical Unclonable Functions (PUFs). It provides the mathematical
Information and Communication Technology for Intelligent Systems
Language: en
Pages: 780
Authors: Tomonobu Senjyu
Categories: Technology & Engineering
Type: BOOK - Published: 2020-10-29 - Publisher: Springer Nature

This book gathers papers addressing state-of-the-art research in all areas of information and communication technologies and their applications in intelligent c
Trusted Computing for Embedded Systems
Language: en
Pages: 299
Authors: Bernard Candaele
Categories: Technology & Engineering
Type: BOOK - Published: 2014-12-11 - Publisher: Springer

This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addres
Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers
Language: en
Pages: 207
Authors: Bryan Jeffrey Parno
Categories: Computers
Type: BOOK - Published: 2014-06-01 - Publisher: Morgan & Claypool

As society rushes to digitize sensitive information and services, it is imperative to adopt adequate security protections. However, such protections fundamental