Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers is popular PDF and ePub book, written by Bryan Jeffrey Parno in 2014-06-01, it is a fantastic choice for those who relish reading online the Computers genre. Let's immerse ourselves in this engaging Computers book by exploring the summary and details provided below. Remember, Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers can be Read Online from any device for your convenience.

Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers Book PDF Summary

As society rushes to digitize sensitive information and services, it is imperative to adopt adequate security protections. However, such protections fundamentally conflict with the benefits we expect from commodity computers. In other words, consumers and businesses value commodity computers because they provide good performance and an abundance of features at relatively low costs. Meanwhile, attempts to build secure systems from the ground up typically abandon such goals, and hence are seldom adopted. In this book, I argue that we can resolve the tension between security and features by leveraging the trust a user has in one device to enable her to securely use another commodity device or service, without sacrificing the performance and features expected of commodity systems. At a high level, we support this premise by developing techniques to allow a user to employ a small, trusted, portable device to securely learn what code is executing on her local computer. Rather than entrusting her data to the mountain of buggy code likely running on her computer, we construct an on-demand secure execution environment which can perform security-sensitive tasks and handle private data in complete isolation from all other software (and most hardware) on the system. Meanwhile, non-security-sensitive software retains the same abundance of features and performance it enjoys today. Having established an environment for secure code execution on an individual computer, we then show how to extend trust in this environment to network elements in a secure and efficient manner. This allows us to reexamine the design of network protocols and defenses, since we can now execute code on endhosts and trust the results within the network. Lastly, we extend the user's trust one more step to encompass computations performed on a remote host (e.g., in the cloud). We design, analyze, and prove secure a protocol that allows a user to outsource arbitrary computations to commodity computers run by an untrusted remote party (or parties) who may subject the computers to both software and hardware attacks. Our protocol guarantees that the user can both verify that the results returned are indeed the correct results of the specified computations on the inputs provided, and protect the secrecy of both the inputs and outputs of the computations. These guarantees are provided in a non-interactive, asymptotically optimal (with respect to CPU and bandwidth) manner. Thus, extending a user's trust, via software, hardware, and cryptographic techniques, allows us to provide strong security protections for both local and remote computations on sensitive data, while still preserving the performance and features of commodity computers.

Detail Book of Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers PDF

Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers
  • Author : Bryan Jeffrey Parno
  • Release : 01 June 2014
  • Publisher : Morgan & Claypool Publishers
  • ISBN : 9781627054799
  • Genre : Computers
  • Total Page : 177 pages
  • Language : English
  • PDF File Size : 21,8 Mb

If you're still pondering over how to secure a PDF or EPUB version of the book Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers by Bryan Jeffrey Parno, don't worry! All you have to do is click the 'Get Book' buttons below to kick off your Download or Read Online journey. Just a friendly reminder: we don't upload or host the files ourselves.

Get Book

Intelligent System Design

Intelligent System Design Author : Suresh Chandra Satapathy,Vikrant Bhateja,B. Janakiramaiah,Yen-Wei Chen
Publisher : Springer Nature
File Size : 54,8 Mb
Get Book
This book presents a collection of high-quality, peer-reviewed research papers from the 6th Internat...

Code Nation

Code Nation Author : Michael J. Halvorson
Publisher : Morgan & Claypool
File Size : 50,7 Mb
Get Book
Code Nation explores the rise of software development as a social, cultural, and technical phenomeno...

Prophets of Computing

Prophets of Computing Author : Dick van Lente
Publisher : Morgan & Claypool
File Size : 19,9 Mb
Get Book
When electronic digital computers first appeared after World War II, they appeared as a revolutionar...

Communities of Computing

Communities of Computing Author : Thomas J. Misa
Publisher : Morgan & Claypool
File Size : 30,7 Mb
Get Book
Communities of Computing is the first book-length history of the Association for Computing Machinery...

Heterogeneous Computing

Heterogeneous Computing Author : Mohamed Zahran
Publisher : Morgan & Claypool
File Size : 41,5 Mb
Get Book
If you look around you will find that all computer systems, from your portable devices to the strong...

Applied Affective Computing

Applied Affective Computing Author : Leimin Tian,Sharon Oviatt,Michal Muszynski,Brent Chamberlain,Jennifer Healey,Akane Sano
Publisher : Morgan & Claypool
File Size : 17,7 Mb
Get Book
Affective computing is a nascent field situated at the intersection of artificial intelligence with ...