001555230 000__ 06412nam\\22005293i\4500 001555230 001__ 1555230 001555230 003__ MiAaPQ 001555230 005__ 20240717003231.0 001555230 006__ m\\\\\o\\d\\\\\\\\ 001555230 007__ cr\cn\nnnunnun 001555230 008__ 240628s2014\\\\xx\\\\\\o\\\\\|||\0\eng\d 001555230 020__ $$a9781627054799 001555230 020__ $$z9781627054775 001555230 035__ $$a(MiAaPQ)EBC1766764 001555230 035__ $$a(Au-PeEL)EBL1766764 001555230 035__ $$a(OCoLC)887509432 001555230 040__ $$aMiAaPQ$$beng$$erda$$epn$$cMiAaPQ$$dMiAaPQ 001555230 050_4 $$aT14.5 001555230 0820_ $$a303.4/83 001555230 1001_ $$aParno, Bryan Jeffrey. 001555230 24510 $$aTrust Extension As a Mechanism for Secure Code Execution on Commodity Computers. 001555230 250__ $$a1st ed. 001555230 264_1 $$aNew York :$$bAssociation for Computing Machinery,$$c2014. 001555230 264_4 $$c©2014. 001555230 300__ $$a1 online resource (209 pages). 001555230 336__ $$atext$$btxt$$2rdacontent 001555230 337__ $$acomputer$$bc$$2rdamedia 001555230 338__ $$aonline resource$$bcr$$2rdacarrier 001555230 4901_ $$aACM Bks. 001555230 5050_ $$aIntro -- Contents -- Preface -- Introduction -- Insecure Computers in a Hostile World -- A Vision for a Better World -- Overview: Building Up from a Firm Foundation -- Bootstrapping Trust in a Commodity Computer -- Securely Executing Code on a Commodity Computer -- Leveraging Secure Code Execution to Improve Network Protocols -- Secure Code Execution Despite Untrusted Software and Hardware -- Summary of Contributions -- Background and Related Work in Trust Establishment -- What Do We Need to Know? Techniques for Recording Platform State -- Can We Use Platform Information Locally? -- Can We Use Platform Information Remotely? -- How DoWe Make Sense of Platform State? -- Roots of Trust -- Validating the Process -- Applications -- Human Factors and Usability -- Limitations -- Additional Reading -- Summary -- Bootstrapping Trust in a Commodity Computer -- Problem Definition -- Potential Solutions -- Preferred Solutions -- Summary -- On-Demand Secure Code Execution on Commodity Computers -- Problem Definition -- Flicker Architecture -- Developer's Perspective -- Flicker Applications -- Performance Evaluation -- Architectural Recommendations -- Summary -- Using Trustworthy Host-Based Information in the Network -- Problem Definition -- The Assayer Architecture -- Potential Attacks -- Case Studies -- Implementation -- Evaluation -- Potential Objections -- Summary -- Verifiable Computing: Secure Code Execution Despite Untrusted Software and Hardware -- Overview -- Cryptographic Background -- Problem Definition -- An Efficient Verifiable-Computation Scheme with Input and Output Privacy -- How to Handle CheatingWorkers -- Summary -- Conclusion -- Bibliography -- Author's Biography. 001555230 506__ $$aAccess limited to authorized users. 001555230 520__ $$aAs society rushes to digitize sensitive information and services, it is imperative to adopt adequate security protections. However, such protections fundamentally conflict with the benefits we expect from commodity computers. In other words, consumers and businesses value commodity computers because they provide good performance and an abundance of features at relatively low costs. Meanwhile, attempts to build secure systems from the ground up typically abandon such goals, and hence are seldom adopted. In this book, I argue that we can resolve the tension between security and features by leveraging the trust a user has in one device to enable her to securely use another commodity device or service, without sacrificing the performance and features expected of commodity systems. At a high level, we support this premise by developing techniques to allow a user to employ a small, trusted, portable device to securely learn what code is executing on her local computer. Rather than entrusting her data to the mountain of buggy code likely running on her computer, we construct an on-demand secure execution environment which can perform security-sensitive tasks and handle private data in complete isolation from all other software (and most hardware) on the system. Meanwhile, non-security-sensitive software retains the same abundance of features and performance it enjoys today. Having established an environment for secure code execution on an individual computer, we then show how to extend trust in this environment to network elements in a secure and efficient manner. This allows us to reexamine the design of network protocols and defenses, since we can now execute code on endhosts and trust the results within the network. Lastly, we extend the user's trust one more step to encompass computations performed on a remote host (e.g., in the cloud). We design, 001555230 5208_ $$aanalyze, and prove secure a protocol that allows a user to outsource arbitrary computations to commodity computers run by an untrusted remote party (or parties) who may subject the computers to both software and hardware attacks. Our protocol guarantees that the user can both verify that the results returned are indeed the correct results of the specified computations on the inputs provided, and protect the secrecy of both the inputs and outputs of the computations. These guarantees are provided in a non-interactive, asymptotically optimal (with respect to CPU and bandwidth) manner. Thus, extending a user's trust, via software, hardware, and cryptographic techniques, allows us to provide strong security protections for both local and remote computations on sensitive data, while still preserving the performance and features of commodity computers. 001555230 588__ $$aDescription based on publisher supplied metadata and other sources. 001555230 650_0 $$aComputers and civilization.$$vCongresses$$0(DLC)sh2009120889 001555230 650_0 $$aInformation technology -- Social aspects.$$xSocial aspects$$vCongresses$$0(DLC)sh2008104640 001555230 650_0 $$aTechnology -- Social aspects.$$xSocial aspects$$0(DLC)sh2008105880 001555230 655_0 $$aElectronic books 001555230 77608 $$iPrint version:$$aParno, Bryan Jeffrey$$tTrust Extension As a Mechanism for Secure Code Execution on Commodity Computers$$dNew York : Association for Computing Machinery,c2014$$z9781627054775 001555230 830_0 $$aACM Bks. 001555230 852__ $$bebk 001555230 85640 $$3ProQuest Ebook Central Academic Complete $$uhttps://univsouthin.idm.oclc.org/login?url=https://ebookcentral.proquest.com/lib/usiricelib-ebooks/detail.action?docID=1766764$$zOnline Access 001555230 909CO $$ooai:library.usi.edu:1555230$$pGLOBAL_SET 001555230 980__ $$aBIB 001555230 980__ $$aEBOOK 001555230 982__ $$aEbook 001555230 983__ $$aOnline