Exploring Trusted Networking for Protected Applications

نویسندگان

  • D J Capelis
  • James Larkby-Lahet
چکیده

In modern computing systems, networking is critical. In the context of trusted application environments, building a trusted networking interface remains an open question. In this paper, we categorize the networking needs of trusted applications into three modes: Local Equivalent, Trusted Local Networks and Internet-Wide Trusted Networking. Collectively these modes enable trusted applications to do everything from securely accessing the network to establishing a valid identity on the local network, or even the Internet. We explore the hardware mechanisms available in currently shipping products which can be used to implement our interfaces. We discuss our plans to prototype these networking interfaces in our lab’s trusted platform called LockBox. We conclude that our trusted networking design is feasible using existing hardware and is ready for implementation.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The State of Online Social networking among Library and Information Sciences Students

Background and Aim: The present paper discusses results of a study which aimed to explore the knowledge and use of Online social networking by MLIS students in Iran and to explore their perceptions of using that technology for academic and professional purposes, and challenges they face for using them. Method: The research method was explorative and empirical. Data was collected through a web-b...

متن کامل

Trusted Ticket Systems and Applications

Trusted Computing is a security base technology that will perhaps be ubiquitous in a few years in personal computers and mobile devices alike. Despite its neutrality with respect to applications, it has raised some privacy concerns. We show that trusted computing can be applied for service access control in a manner protecting users’ privacy. We construct a ticket system, a concept at the heart...

متن کامل

Preparation of Papers in Two-Column Format for Conference Proceedings Sponsored by IEEE

This paper is a brief survey of IEEE 802.11i based WPA2 or Wi-Fi protected Mode protocol popularly called as Wi-Fi Protected Access (WPA) Mode Protocol. In this paper we tried our best to include all possible information about WPA from trusted sources in a very precise manner. Apart from the above the paper also explores wireless networking standards in brief so that one can become familiar wit...

متن کامل

On-demand Isolated I/O for Security-sensitive Applications on Commodity Platforms

Today large software systems (i.e., giants) thrive in commodity markets, but are untrustworthy due to their numerous and inevitable software bugs that can be exploited by the adversary. Thus, the best hope of security is that some small, simple, and trustworthy software components (i.e., wimps) can be protected from attacks launched by adversary-controlled giants. However, wimps in isolation ty...

متن کامل

Sevigator: Network Confinement of Malware Applications and Untrusted Operating Systems

Stuxnet worm opened a new era in cybersecurity. This heavily networking virus implemented a new threat: it infects industrial control systems; consequences of the infection might be as gravy as a technogenic catastrophe. Stuxnet performs networking to communicate between instances, contact so called “Stuxnet command and control center”, and upload malicious code to real-time controllers. The vi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012