Secure Execution of Mutually Mistrusting Software
نویسنده
چکیده
Commodity operating systems, e.g. Linux and Android, running on PC or smartphone, are ubiquitous in home, commercial, government, and military settings. The booming popularity of PC and smartphone makes the commodity operating system an attractive target for attacks. These systems are tasked with a variety of applications, e.g. from secure software provided by trusted enterprises to regular applications including games and web browsers downloaded from untrusted third-party website. Since PC and smartphone are used both for working and entertainment, both trusted and untrusted applications are installed on the same commodity operating system. The complex interface between malicious applications and the operating system kernel makes the latter one vulnerable to malware. The compromised untrusted operating system is able to break both privacy and integrity of secure applications. The user mode secure application is not tamper-resistant and immune to the privileged malicious operating system kernel. Various methods have been proposed to execute mutually mistrusting software on commodity operating systems. In this talk, we divide the state of the art research papers into three classes. First, we discuss how to protect the secure application from the untrusted operating system. Second, we discuss the isolation of untrusted application from the benign operating system. Third, we discuss how to remove the trust relationship between application and operating system, that is, neither application nor operating system trust each other. We finally propose a framework for the secure execution of sensitive code on ARM architecture with TrustZone technology. Research Proficiency Exam Report, August, 2014, Stony Brook, NY, USA.
منابع مشابه
Controlled Physical Random Functions
A Physical Random Function (PUF) is a random function that can only be evaluated with the help of a complex physical system. We introduce Controlled Physical Random Functions (CPUFs) which are PUFs that can only be accessed via an algorithm that is physically bound to the PUF in an inseparable way. CPUFs can be used to establish a shared secret between a physical device and a remote user. We pr...
متن کاملOn the Security of O-PSI a Delegated Private Set Intersection on Outsourced Datasets (Extended Version)
In recent years, determining the common information privately and efficiently between two mutually mistrusting parties have become an important issue in social networks. Many Private set intersection (PSI) protocols have been introduced to address this issue. By applying these protocols, two parties can compute the intersection between their sets without disclosing any information about compone...
متن کاملGeneric Fair Non-Repudiation Protocols with Transparent Off-line TTP
A non-repudiation protocol is aimed for exchanging a digital message and an irrefutable receipt between two mistrusting parties over the Internet. Such a protocol is said fair, if at the end of any possible protocol execution, either both parties obtain their expected items or neither party does. In this paper, we first argue that it is really meaningful in practice to exploit generic fair non-...
متن کاملGeneric non-repudiation protocols supporting transparent off-line TTP
A non-repudiation protocol enables the fair exchange of an electronic message and an irrefutable digital receipt between two mistrusting parties over the Internet. That is, at the end of any execution instance of such a protocol, either both parties obtain their expected items or neither party does. In this paper, we first argue that it is really meaningful in practice to exploit generic fair n...
متن کاملKey Escrow in Mutually Mistrusting Domains
In this paper we present a key escrow system which meets possible requirements for international key escrow, where diierent domains may not trust each other. In this system multiple third parties, who are trusted collectively but not individually, perform the dual role of providing users with key management services and providing autho-rised agencies in the relevant domains with warranted acces...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014