Filters








632 Hits in 11.1 sec

Tiny-CFA: A Minimalistic Approach for Control-Flow Attestation Using Verified Proofs of Execution [article]

Ivan De Oliveira Nunes, Sashidhar Jakkamsetti, Gene Tsudik
2020 arXiv   pre-print
Hybrid trust anchors support security services, such as remote attestation, proofs of software update/erasure/reset, proofs of remote software execution, in resource-constrained MCU-s, e.g., MSP430 and  ...  In this work, we tackle this challenge by designing Tiny-CFA - a control-flow attestation (CFA) technique with a single hardware requirement - the ability to generate proofs of remote software execution  ...  Remote Attestation (RA) As mentioned earlier, RA allows a trusted verifier (Vrf) to detect unauthorized code modifications (e.g., malware infections) on an untrusted remote device, called a prover (Prv  ... 
arXiv:2011.07400v2 fatcat:omjsmbsr6fbiflwm6rf3rdzrpm

On the TOCTOU Problem in Remote Attestation [article]

Ivan De Oliveira Nunes, Sashidhar Jakkamsetti, Norrathep Rattanavipanon, Gene Tsudik
2021 arXiv   pre-print
RATA targets hybrid RA architectures (implemented as Hardware/Software co-designs), which are aimed at low-end embedded devices.  ...  Each is shown to be secure and accompanied by a publicly available and formally verified implementation. Our evaluation demonstrates low hardware overhead of both techniques.  ...  APEX [6] builds on top of VRASED to develop a verified architecture for proofs of remote software execution on low-end devices [6] .  ... 
arXiv:2005.03873v2 fatcat:oewjkublwfgzpl4h773d5lu5q4

Orchestrating Layered Attestations [chapter]

John D. Ramsdell, Paul D. Rowe, Perry Alexander, Sarah C. Helble, Peter Loscocco, J. Aaron Pendergrass, Adam Petz
2019 Research Series on the Chinese Dream and China's Development Path  
All results have been formally verified with the Coq proof assistant.  ...  Layered attestations provide a remote appraiser with structured evidence of the integrity of a target system to support a trust decision.  ...  Places may be as simple as an IoT device that returns a single value on request or as complicated as a full SELinux installation capable of complex protocol execution.  ... 
doi:10.1007/978-3-030-17138-4_9 dblp:conf/post/RamsdellRAHLPP19 fatcat:43qir7goxbdmfb5mq7udh7sfiy

The Android Platform Security Model [article]

René Mayrhofer, Jeffrey Vander Stoep, Chad Brubaker, Nick Kralevich
2020 arXiv   pre-print
The model needs to strike a difficult balance between security, privacy, and usability for end users, assurances for app developers, and system performance under tight hardware constraints.  ...  model needs to address a host of practical threats in a wide variety of scenarios while being useful to non-security experts.  ...  ACKNOWLEDGMENTS We would like to thank Dianne Hackborn for her influential work over a large part of the Android platform security history and insightful remarks on earlier drafts of this paper.  ... 
arXiv:1904.05572v2 fatcat:mivqkc76j5bq7ltojhtwtekdpq

Cybersecurity threats in cloud computing

Julian Jang-Jaccard, Surya Nepal, Y Jay Guo
2013 Australian Journal of Telecommunications and the Digital Economy  
Given its innovative nature and reliance on the Internet, the cloud inherently comes with a number of vulnerabilities that increase the space for cyber attacks.  ...  The next section provides a brief overview of cloud computing, which is followed by the discussion on the privacy, security, and trust issues related to cloud computing.  ...  Botnets and Denial of Service (DoS) Bots (short for "robots") are malware programs covertly installed on a user's machine that allow an unauthorised user to remotely control the compromised computer for  ... 
doi:10.7790/ajtde.v1n1.4 fatcat:7iu6hnuitjdw5mzdrl23ip4h5m

Cybersecurity threats in cloud computing

Julian Jang Jaccard
2013 Australian Journal of Telecommunications and the Digital Economy  
Given its innovative nature and reliance on the Internet, the cloud inherently comes with a number of vulnerabilities that increase the space for cyber attacks.  ...  Recently we have witnessed the emergence of cloud computing as a new computing model that offers resources (e.g., compute, storage, network, etc.) as general utilities to be leased and released on-demand  ...  Botnets and Denial of Service (DoS) Bots (short for "robots") are malware programs covertly installed on a user's machine that allow an unauthorised user to remotely control the compromised computer for  ... 
doi:10.18080/ajtde.v1n1.128 fatcat:jcogbhos55d7hfmpqbqspq73jm

FireDroid

Giovanni Russello, Arturo Blas Jimenez, Habib Naderi, Wannes van der Mark
2013 Proceedings of the 29th Annual Computer Security Applications Conference on - ACSAC '13  
Given these facts, FireDroid represents a practical solution for strengthening security on Android smartphones.  ...  Finally, we provide an experimental evaluation of our approach showing that it has only a limited overhead.  ...  Also, we are grateful for the financial support for realising FireDroid provided by Auckland UniServices Limited. Finally, we want to express our appreciation to Dr.  ... 
doi:10.1145/2523649.2523678 dblp:conf/acsac/RusselloJNM13 fatcat:x2bi7frrnbhevnvcq25lntkgay

D8.5 First Report On Innovation And Explotation Actions

George Tsolis, Bessem Sayadi, Francisco Fontes, Michael J. McGrath, Elisa Rojas, Claudio Pisa, John Thomson, Stefano Salsano
2018 Zenodo  
on the exploitation of its results.  ...  This deliverable reports on the innovation and exploitation actions taken, overall progress against plan, as well as on awareness of the results achieved by the project until M23.  ...  research framework Apex Lake which is focused on realising intelligent orchestration proof of concepts.  ... 
doi:10.5281/zenodo.1239453 fatcat:vvr3mv4yqjdifhsf7rx2hvdhz4

From piz daint to the stars

Gregor Daiß, Dirk Pfüger, Parsa Amini, John Biddiscombe, Patrick Diehl, Juhan Frank, Kevin Huck, Hartmut Kaiser, Dominic Marcello, David Pfander
2019 Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis on - SC '19  
We show scalability up to full system runs on Piz Daint. For the scenario's maximum resolution, the compute-critical parts (hydrodynamics and gravity) achieve 68.1% parallel efficiency at 2048 nodes.  ...  To face the challenge of increasingly complex, diverse, and heterogeneous HPC systems, Octo-Tiger relies on high-level programming abstractions.  ...  of Computation & Technology at Louisiana State University for supporting this work.  ... 
doi:10.1145/3295500.3356221 dblp:conf/sc/DaissABDFHKMPP19 fatcat:wk2folknurevnf7vklqkg4mjyy

General Chairman's Message

1983 1983 IEEE Symposium on Security and Privacy  
Finally PGL would like to thank John Kelly for asking for review comments on [9].  ...  We also acknowledge the very helpful comments of our colleagues Myla Archer and Bruce Labaw on earlier drafts of this paper.  ...  One might view the use of such automatic verification tools as a compromise towards fully verified models.  ... 
doi:10.1109/sp.1983.10000 fatcat:gwmwca6z6vcs7oo44rri25ie4i

General Chairman's Message

1986 MILCOM 1986 - IEEE Military Communications Conference: Communications-Computers: Teamed for the 90's  
Finally PGL would like to thank John Kelly for asking for review comments on [9].  ...  We also acknowledge the very helpful comments of our colleagues Myla Archer and Bruce Labaw on earlier drafts of this paper.  ...  One might view the use of such automatic verification tools as a compromise towards fully verified models.  ... 
doi:10.1109/milcom.1986.4805639 fatcat:yv3yt6hivvg4bjtj5ftdxp7dke

General Chairman's Message

2004 PLANS 2004 Position Location and Navigation Symposium (IEEE Cat No 04CH37556) PLANS-04  
Finally PGL would like to thank John Kelly for asking for review comments on [9].  ...  We also acknowledge the very helpful comments of our colleagues Myla Archer and Bruce Labaw on earlier drafts of this paper.  ...  One might view the use of such automatic verification tools as a compromise towards fully verified models.  ... 
doi:10.1109/plans.2004.1308961 fatcat:jrv2qudaw5e4fm7vtyfx4clip4

General Chairman's Message

1986 MILCOM 1986 - IEEE Military Communications Conference: Communications-Computers: Teamed for the 90's  
Finally PGL would like to thank John Kelly for asking for review comments on [9].  ...  We also acknowledge the very helpful comments of our colleagues Myla Archer and Bruce Labaw on earlier drafts of this paper.  ...  One might view the use of such automatic verification tools as a compromise towards fully verified models.  ... 
doi:10.1109/milcom.1986.4805808 fatcat:45cvhs7md5gupdkd4rckkqy3qm

General Chairman's Message

1985 22nd ACM/IEEE Design Automation Conference  
Finally PGL would like to thank John Kelly for asking for review comments on [9].  ...  We also acknowledge the very helpful comments of our colleagues Myla Archer and Bruce Labaw on earlier drafts of this paper.  ...  One might view the use of such automatic verification tools as a compromise towards fully verified models.  ... 
doi:10.1109/dac.1985.1585898 fatcat:qcddxeqjfrgcnkywt4dlol5s2u

General Chairman's Message

1986 MILCOM 1986 - IEEE Military Communications Conference: Communications-Computers: Teamed for the 90's  
Finally PGL would like to thank John Kelly for asking for review comments on [9].  ...  We also acknowledge the very helpful comments of our colleagues Myla Archer and Bruce Labaw on earlier drafts of this paper.  ...  One might view the use of such automatic verification tools as a compromise towards fully verified models.  ... 
doi:10.1109/milcom.1986.4805724 fatcat:ywopnvuobzd7nfg5vqbicn6wcy
« Previous Showing results 1 — 15 out of 632 results