Linked e-resources
Details
Table of Contents
Intro
Contents
Preface
Introduction
Insecure Computers in a Hostile World
A Vision for a Better World
Overview: Building Up from a Firm Foundation
Bootstrapping Trust in a Commodity Computer
Securely Executing Code on a Commodity Computer
Leveraging Secure Code Execution to Improve Network Protocols
Secure Code Execution Despite Untrusted Software and Hardware
Summary of Contributions
Background and Related Work in Trust Establishment
What Do We Need to Know? Techniques for Recording Platform State
Can We Use Platform Information Locally?
Can We Use Platform Information Remotely?
How DoWe Make Sense of Platform State?
Roots of Trust
Validating the Process
Applications
Human Factors and Usability
Limitations
Additional Reading
Summary
Bootstrapping Trust in a Commodity Computer
Problem Definition
Potential Solutions
Preferred Solutions
Summary
On-Demand Secure Code Execution on Commodity Computers
Problem Definition
Flicker Architecture
Developer's Perspective
Flicker Applications
Performance Evaluation
Architectural Recommendations
Summary
Using Trustworthy Host-Based Information in the Network
Problem Definition
The Assayer Architecture
Potential Attacks
Case Studies
Implementation
Evaluation
Potential Objections
Summary
Verifiable Computing: Secure Code Execution Despite Untrusted Software and Hardware
Overview
Cryptographic Background
Problem Definition
An Efficient Verifiable-Computation Scheme with Input and Output Privacy
How to Handle CheatingWorkers
Summary
Conclusion
Bibliography
Author's Biography.
Contents
Preface
Introduction
Insecure Computers in a Hostile World
A Vision for a Better World
Overview: Building Up from a Firm Foundation
Bootstrapping Trust in a Commodity Computer
Securely Executing Code on a Commodity Computer
Leveraging Secure Code Execution to Improve Network Protocols
Secure Code Execution Despite Untrusted Software and Hardware
Summary of Contributions
Background and Related Work in Trust Establishment
What Do We Need to Know? Techniques for Recording Platform State
Can We Use Platform Information Locally?
Can We Use Platform Information Remotely?
How DoWe Make Sense of Platform State?
Roots of Trust
Validating the Process
Applications
Human Factors and Usability
Limitations
Additional Reading
Summary
Bootstrapping Trust in a Commodity Computer
Problem Definition
Potential Solutions
Preferred Solutions
Summary
On-Demand Secure Code Execution on Commodity Computers
Problem Definition
Flicker Architecture
Developer's Perspective
Flicker Applications
Performance Evaluation
Architectural Recommendations
Summary
Using Trustworthy Host-Based Information in the Network
Problem Definition
The Assayer Architecture
Potential Attacks
Case Studies
Implementation
Evaluation
Potential Objections
Summary
Verifiable Computing: Secure Code Execution Despite Untrusted Software and Hardware
Overview
Cryptographic Background
Problem Definition
An Efficient Verifiable-Computation Scheme with Input and Output Privacy
How to Handle CheatingWorkers
Summary
Conclusion
Bibliography
Author's Biography.