Remote Booting in a Hostile World

نویسندگان

  • Mark Lomas
  • Bruce Christianson
چکیده

Computer n the spring of 1989, students at the University of Cambridge successfully penetrated the Computer Laboratory system. The attack on I computers used as public area terminals was intricate and involved physically dismantling and replacing components with new firmware that recorded user passwords for later replay.’ The laboratory responded by modifymg the anti-theft devices to ensure that future hardware tampering would be evident to a careful user. Today’s networked computer systems are even more vulnerable to attack: Terminal software, like that used by the X Window System, is frequently passed across a network, and a trojan horse can easily be inserted while it is in transit. Many other software products, including operating systems, load parts of themselves from a server across a network. Although users may be confident that their workstation is physically secure, some part of the network to which they are attached almost certainly is not secure. Most proposals that recommend cryptographic means to protect remotely loaded software also eliminate the advantages of remote loading-for example, ease of reconfiguration, upgrade distribution, and maintenance. For this reason, they have largely been abandoned before finding their way into commercial products. This article shows that, contrary to intuition, it is no more difficult to protect a workstation that loads its software across an insecure network than to protect a stand-alone workstation. Flexibility is not sacrificed with our solution, nor are users required to trust the integrity of anypart of the system that they cannot physically see or control.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

OpenLabs Security Laboratory - The Online Security Experiment Platform

For experiments to be reproducible, it is important to have a known and controlled environment. This requires isolation from the surroundings. For security experiments, e.g. with hostile software, this is even more important as the experiment can affect the environment in adverse ways. In a normal campus laboratory, isolation can be achieved by network separation. For an online environment, whe...

متن کامل

Estimating FAPAR of Rice Growth Period Using Radiation Transfer Model Coupled with the WOFOST Model for Analyzing Heavy Metal Stress

Timely assessment of crop growth conditions under heavy metal pollution is of great significance for agricultural decision-making and estimation of crop productivity. The object of this study is to assess the effects of heavy metal stress on physiological functions of rice through the spatial-temporal analysis of the fraction of absorbed photosynthetically active radiation (FAPAR). The calculat...

متن کامل

Hostile intent in public crowded spaces: a field study.

Hostile reconnaissance is vital to successful terrorist activity. Individuals carrying out this activity are likely to experience raised levels of stress and this will manifest itself at biological, physiological, psychological and behavioural levels, providing an opportunity for detection. A field trial was undertaken in an ecologically valid environment measuring variables considered likely t...

متن کامل

ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets

Many commodity operating systems and applications become infested with malicious software over time, primarily due to exploits that take advantage of software flaws and operator errors. In this paper, we present the salient features of a system design which allows remote-device authentication by a verifier, reaching malware-free system states, and trusted application booting in the presence of ...

متن کامل

Data Acquisition and Control System Using Embedded Web Server

This paper realizes an embedded web server, which enables data acquisition and status monitoring with the help of any standard web browser. User can monitor and control remote temperature and video information The platform used is Linux and ARM 9 processor. Biggest advantage of this web server is embedding a PC based web server into the ARM platform without losing any of its features. It consis...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009