<p>This volume contains the 16 papers presented at the INTRUST 2009 conf- ence, held in Beijing, China in December 2009. INTRUST 2009 was the ?rst international conference on the theory, technologies and applications of trusted systems. It was devoted to all aspects of trusted computing systems, inc
Trusted Systems: First International Conference, INTRUST 2009, Beijing, China, December 17-19, 2009. Proceedings (Lecture Notes in Computer Science, 6163)
โ Scribed by Liqun Chen (editor), Moti Yung (editor)
- Publisher
- Springer
- Year
- 2010
- Tongue
- English
- Leaves
- 276
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
This volume contains the 16 papers presented at the INTRUST 2009 conf- ence, held in Beijing, China in December 2009. INTRUST 2009 was the ?rst international conference on the theory, technologies and applications of trusted systems. It was devoted to all aspects of trusted computing systems, incl- ing trusted modules, platforms, networks, services and applications, from their fundamental features and functionalities to design principles, architecture and implementation technologies. The goal of the conference was to bring academic and industrial researchers, designers and implementers together with end-users of trusted systems, in order to foster the exchange of ideas in this challenging and fruitful area. The program consisted of 3 invited talks and 20 contributed papers. The - vited speakerswere Wenchang Shi (Renmin Universityof China), DavidWooten (Microsoft) and Scott Rotondo (Sun Microsystems). The ?rst speaker provided a paper, which is included in these proceedings. Special thanks are due to these speakers. The contributed talks were arranged with two main tracks, one devoted to academic aspects of trusted computing systems (addressed by these proce- ings), and the other devoted to industrial aspects. The contributed papers were selected out of 42 submissions from 13 countries. The refereeing process was rigorous, involving at least three (and mostly more) independent reports being prepared for each submission. We are very grateful to our hard-working and distinguished Program Committee for doing such an excellent job in a timely fashion.
โฆ Table of Contents
Title Page
Preface
INTRUST 2009
Table of Contents
Invited Talk
On Design of a Trusted Software Base with Support of TPCM
Introduction
Practical Needs for a Trusted Software Base
Significance of Trust Functions in System Software
Significance of a TSB
Philosophy in TSB Design
The Logical Two-System Concept
Enforcement Method for the Two-System Concept
Approaches to Designing TSB
Architecture Framework
Primary Trust Base
Baseline Repository
Control Mechanism
Measurement Mechanism
Decision Mechanism
Underpinning Mechanism
Capabilities of Isolation and Interaction
Capability of Evolvement
Considerations on TSB Implementation
Layered Structure
Program Organization
Protecting the TSB
Evolvement of TSB
Service Interface
A Few More Words
Related Work
Conclusion
References
Secure Storage
External Authenticated Non-volatile Memory with Lifecycle Management for State Protection in Trusted Computing
Introduction
Requirements
Assumptions
Requirements
Design Overview
Design Choices
Layout of Non-volatile Memory
Keys, States and Commands
State Management and Lifecycle Model
SSC Management Logic
Error Recovery
Probabilistic Updates
Analysis
Implementation
Conclusions
References
A Method for Safekeeping Cryptographic Keys from Memory Disclosure Attacks
Introduction
General Threat Model
The Safekeeping Method and Its Implementation
Basic Idea and Resulting Prototype
Scrambling and Dispersing a Key in RAM
Obscuring the Index Table
Disabling Interrupts
Refining Attacks by Considering Our Design
Security Analysis
Example Scenario
Effects of the Key Compromise Methods
Security Summary
Performance Analysis of Prototype
Related Work
Conclusion and Open Problems
References
Attestation
Remote Attestation on Function Execution (Work-in-Progress)
Introduction
Related Work
Preliminaries
Call Stack
Secure Kernel
Debug Trap
Scheme Overview
Architecture
Trust Chain
Rationale
Design Details
Preprocessing Phase
Runtime Phase
Verification Phase
Discussions
Characteristics of Mission Critical Functions
Attest Multiple Functions
Context Switch
Data Flow Attestation
Conclusion
References
Scalable Remote Attestation with Privacy Protection (Work in Progress)
Introduction
Motivating Use Case
Target Architecture
Scalable Behavior Attestation
Scalable Program Execution Attestation
Scalable Integrity Measurement Architecture
Implementation
Discussion
Related Work
Conclusion and Future Work
References
Anonymous Credentials for Java Enabled Platforms: A Performance Evaluation
Introduction
Related Work
The DAA Scheme and Performance Results
Parameter Setup
The Join Process
Camenisch-Lysyanskaya Signatures
DAA Signature Creation
DAA Signature Verification
Implementation Details and Discussion
Modular Arithmetic in BouncyCastle and IAIK JCE-ME
Random Number Generation on J2ME Platforms
Hashing of Bignumber Objects
Prime Number Generation
Embedded Java Performance Improvements
Test Environment
Test Devices
Future Work and Improvements
Conclusion
References
Trusted Network
SocialClouds: Concept, Security Architecture and Some Mechanisms
Introduction
SocialClouds: Concept
SocialCloud Challenges and Security Architecture
Challenges of SocialClouds
Threat Modeling and Implications
A Security Architecture for SocialClouds
CryptoOverlay: A Cryptographic Architecture
Two CryptoOverlay Primitives
Cryptographic Preliminaries
Definition and Security of Assembly Signature and Identification Schemes
Constructing Assembly Signature and Identification Schemes
Performance Analysis and Improvement
Related Work
Conclusion
References
Privacy Enhanced Trusted Network Connect
Introduction
Related Work
TNC in a Nutshell
NAC Assessment Threats in Example
Client-Side Policies in a TNC Environment
General Approach
Expressing Client-Side Policies in XML
Policy Enforcement
Security Considerations
Applicability Considerations
Conclusion and Future Work
References
Research on Multistage Interconnection Architecture and Collision Detection Model (Work-in-Progress)
Introduction
Architecture of Multistage HSLIS Interconnection
Collision Detection of Multistage Interconnection Policy
Description of Policy Collision
Detection and Resolution of Policy Collision
Conclusions
References
Virtualization
Trusted Virtual Domains โ Design, Implementation and Lessons Learned
Introduction
Design Goals
Assumptions, Threat Model, and Requirements Analysis
Design of TVD Infrastructure
General TVD Architecture
TVD Deploy Protocol
TVD Join Protocol
TVD Leave and Undeploy Protocols
Membership Revocation and Policy Update
Implementation
An Application Scenario
The VDC Demonstrator
Networked Hypervisor Abstraction
Virtual Networking for TVDs
TVD Policy
Revocation of TVD Components
Lessons Learned
Multiple Logical Networks for Intra-TVD Networking
Revocation Issues
Labeling Scheme Needed to Control Access to Resources
Hypervisor Abstraction Layer Needs More Abstraction
TVD Policy Definition
Related Work
Conclusion
References
Trusted Integrity Measurement and Reporting for Virtualized Platforms (Work-in-Progress)
Introduction
Background
Trusted Computing
Machine Virtualization
Motivation of This Work
Overview of Our Solution
A Key Management Method
Two Integrity Management Services
Basic Integrity Management
Hierarchical Integrity Management
Related Work
Conclusions
References
Applications
A Feather-Weight Application Isolation Model (Work-in-Progress)
Introduction
Relative Works
Noninterference Information Flow Model
Sandbox
Virtual Machine
An Overview of FAI
Process Permission Constraint (PPC)
Object Access Control (OAC)
Features of FAI Model
Formal Model of FAI
Security Analysis
Reducing Interfere among Processes
Resisting Malware Attack
Defending Attack toward Software Vulnerability
Implementation
PPC Module
OAC Module
Policy Manage Module
WAPS Analysis
Conclusion and Future Work
References
Exploring Trust of Mobile Applications Based on User Behaviors (Work-in-Progress)
Introduction
Background
Methods
Our Proposed Trust Model and Scale Development
Data Collection
Analysis and Results
Data Processing and Analysis
Results
Limitations and Suggestions for Future Research
Conclusions and Future Work
References
Trusted Firmware Services Based on TPM
Introduction
Related Works
UEFI Based Firmware
TPM Based Security
Trusted Firmware Services
Biometric Password Protection
Sensitive Data Protection
UEFI Intrusion Reporting
Experiments
Conclusion
References
Supporting Technology
Improved Cryptanalysis of the FOX Block Cipher
Introduction
Preliminaries
FOX Block Cipher
Pseudorandom and Strong Pseudorandom Permutations
Pseudorandomness of FOX64
2-Round Pseudorandom Distinguisher of FOX64
3-Round Strong Pseudorandom Distinguisher of FOX64
Impossible Differential Cryptanalysis of FOX
4-Round Impossible Differential Characteristics
Impossible Differential Attack on FOX
Conclusion
References
Bitwise Higher Order Differential Cryptanalysis
Introduction
Preliminaries
Higher Order Differential Cryptanalysis
Boolean Function
Bitwise Higher Order Differential Cryptanalysis
An Efficient Algorithm
Several Methods to Simplify Computation
Cryptanalysis of Feistel Network
Cryptanalysis of PRESENT
Conclusion and Further Works
References
Author Index
๐ SIMILAR VOLUMES
<p>This volume contains the 16 papers presented at the INTRUST 2009 conf- ence, held in Beijing, China in December 2009. INTRUST 2009 was the ?rst international conference on the theory, technologies and applications of trusted systems. It was devoted to all aspects of trusted computing systems, inc
<span>The 1st InternationalConference on Information Systems Security (ICISS 2005) was held December 19 21, 2005 at Jadavpur University, Kolkata, India. The objectives of the conference were to discuss in depth the current state of the research and practice in information systems security, enable pa
<p><P>This book constitutes the reviewed proceedings of the first International Conference on Cloud Computing, CloudCom 2009, held in Beijing, China, December 1-4, 2009.</P><P>The 42 full papers presented together with four invited papers were carefully selected from 200 submissions. </P><P>This boo
<p><P>This book constitutes the reviewed proceedings of the first International Conference on Cloud Computing, CloudCom 2009, held in Beijing, China, December 1-4, 2009.</P><P>The 42 full papers presented together with four invited papers were carefully selected from 200 submissions. </P><P>This boo
<span>These proceedings contain the papers presented at the 2005 IFIP International Conference on Network and Parallel Computing (NPC 2005), held in Beijing, China, between November 30 and December 3, 2005. The goal of the conference was to establish an international forum for engineers and scientis