Trust extension as a mechanism for secure code execution on commodity computers / Bryan Jeffrey Parno, Microsoft Research.
| Author/creator | Parno, Bryan |
| Format | Electronic |
| Edition | First edition. |
| Publication Info | [San Rafael, California] : Morgan & Claypool Publishers, [2014] |
| Description | xvii, 188 pages : illustrations (some color) ; 24 cm |
| Supplemental Content | Full text available from Ebook Central - Academic Complete |
| Subjects |
| Series | ACM Books series ; #2 ACM books #2. ^A1287316 |
| Abstract | "As society rushes to digitize sensitive information and services, it is imperative to adopt adequate security protections. However, such protections fundamentally conflict with the benefits we expect from commodity computers. In other words, consumers and businesses value commodity computers because they provide good performance and an abundance of features at relatively low costs. Meanwhile, attempts to build secure systems from the ground up typically abandon such goals, and hence are seldom adopted. I argue that we can resolve the tension between security and features by leveraging the trust a user has in one device to enable her to securely use another commodity device or service, without sacrificing the performance and features expected of commodity systems. At a high level, we support this premise by developing techniques to allow a user to employ a small, trusted, portable device to securely learn what code is executing on her local computer. Rather than entrusting her data to the mountain of buggy code likely running on her computer, we construct an on-demand secure execution environment which can perform security-sensitive tasks and handle private data in complete isolation from all other software (and most hardware) on the system. Meanwhile, non- security-sensitive software retains the same abundance of features and performance it enjoys today. Having established an environment for secure code execution on an individual computer, we then show how to extend trust in this environment to network elements in a secure and efficient manner. This allows us to reexamine the design of network protocols and defenses, since we can now execute code on end hosts and trust the results within the network. Lastly, we extend the user's trust one more step to encompass computations performed on a remote host (e.g., in the cloud). We design, analyze, and prove secure a protocol that allows a user to outsource arbitrary computations to commodity."-- Publisher's description. |
| Bibliography note | Includes bibliographical references (pages 173-188). |
| Access restriction | Available only to authorized users. |
| Technical details | Mode of access: World Wide Web |
| Genre/form | Electronic books. |
| LCCN | 2016304730 |
| ISBN | 9781627054775 (print) |
| ISBN | 1627054774 (print) |
Availability
| Library | Location | Call Number | Status | Item Actions |
|---|---|---|---|---|
| Electronic Resources | Access Content Online | ✔ Available |