The Community for Technology Leaders
RSS Icon
Issue No.04 - October-December (2007 vol.6)
pp: 24-30
Ajay Surie , Carnegie Mellon University
Adrian Perrig , Carnegie Mellon University
Mahadev Satyanarayanan , Carnegie Mellon University
David J. Farber , Carnegie Mellon University
The emergence of pervasive computing systems such as Internet Suspend/Resume has facilitated access to a user's personalized computing environment for transient use on unmanaged hardware. Trust-Sniffer, a tool that helps users gain confidence in using software on an untrusted machine, addresses this usage model's associated security risks. The root of trust is a small, user-carried device such as a USB memory stick. Trust-Sniffer verifies the target machine's on-disk boot image and incrementally expands the zone of trust by validating applications, including dynamically linked libraries, before they execute. Trust-Sniffer validates an application by comparing its checksum to a list of known good checksums. If it can't validate a binary, it blocks the binary's execution. This staged approach to establishing confidence in an untrusted machine strikes a balance between security and ease of use and facilitates rapid use of transient hardware. This article is part of a special issue on security and privacy.
establishing trust, untrusted terminal, transient use, trusted computing, load-time validation, Internet Suspend/Resume
Ajay Surie, Adrian Perrig, Mahadev Satyanarayanan, David J. Farber, "Rapid Trust Establishment for Pervasive Personal Computing", IEEE Pervasive Computing, vol.6, no. 4, pp. 24-30, October-December 2007, doi:10.1109/MPRV.2007.84
1. M. Kozuch and M. Satyanarayanan, "Internet Suspend/Resume," Proc. 4th IEEE Workshop Mobile Computing Systems and Applications, IEEE CS Press, 2002, p. 40.
2. M. Satyanaranyanan et al., "Towards Seamless Mobility on Pervasive Hardware," Pervasive and Mobile Computing, vol. 1, no. 2, 2005, pp. 157–189.
3. M. Satyanaranyanan et al., "Pervasive Personal Computing in an Internet Suspend/Resume System," IEEE Internet Computing, vol. 11, no. 2, 2007, pp. 16–25.
4. S.T. King et al., "SubVirt: Implementing Malware with Virtual Machines," Proc. 2006 IEEE Symp. Security and Privacy, IEEE CS Press, 2006, pp. 314–327.
5. R. Sailer et al., "Design and Implementation of a TCG-Based Integrity Measurement Architecture," Proc. 13th Conf. USENIXSecurity Symp., USENIXAssoc., 2004, pp. 223–238.
6. A.B. Brown and M.I. Seltzer, "Operating System Benchmarking in the Wake of LMbench: A Case Study of the Performance of NetBSD on the Intel x86 Architecture," Proc. 1997 ACM SIGMETRICSInt'l Conf. Measurement and Modeling of Computer Systems, ACM Press, 1997, pp. 214–224.
24 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool