Spy: a method to secure clients for network services

R.J. Lipton1, S. Rajagopalan2, D.N. Serpanos3,4
1College of Computing, Georgia Institute of Technology, Atlanta, CA, USA
2Telcordia Technologies, Inc., Morristown, NJ, USA
3Department of Electrical and Computer Eng., University of Patras, Patras, Greece
4Industrial Systems Institute, Patras, Greece

Tóm tắt

A fundamental problem in security is guaranteeing correct program behavior on an untrusted computer regardless of a user's actions. The problem appears in digital rights management, secure boot, e-appliances, etc. All existing approaches are either partial or unreliable. Today, dependable security is necessary not only for e-commerce, but also to ensure that, under critical conditions of information warfare, remote clients behave predictably and securely, and cannot compromise the infrastructure. We prove that the problem of correct program execution is unsolvable without adoption of a trusted hardware platform. Since it is impractical to consider as trusted a complex computer system, we identify the minimal hardware support that enables a complete solution. We propose two simple hardware mechanisms which require minimal change to the currently popular PC architecture: (i) the use of a trusted "sealed" computing device, the "spy", and (ii) a hardware interrupt, called "two minute warning", which has the highest priority and has a pre-defined time difference from any subsequent interrupt. Finally, we incrementally build upon this minimal hardware support larger and more complex applications with guaranteed security. We call this construction the inverse security pyramid.

Từ khóa

#Hardware #Military computing #Propagation losses #Computer security #Information security #Application software #Protection #Intellectual property #Content management #Computer industry

Tài liệu tham khảo

low, 1998, Java control flow obfuscation macdonald, 0, On program security and obfuscation monrose, 1999, Distributed Execution with Remote Audit, ISOC Network and Distributed System Security Symposium, 103 palmer, 0, An Introduction to Citadel - A Secure Crypto Coprocessor for Workstations, IFIP SEC’94 Curacao sander, 1998, On Software Protection via Function Hiding, Proc 2nd Workshop Information Hiding, 111, 10.1007/3-540-49380-8_9 sander, 1998, Protecting Mobile Agents Against Malicious Hosts, Mobile Agents and Security LNCS 1419, 44, 10.1007/3-540-68671-1_4 10.1109/ISCC.2001.935348 yee, 1994, Secure Co-processors 10.1145/502034.502036 collberg, 1997, A Taxonomy of Obfuscating Transformations, Technical Report Technical Report TR-148 Department of Computer Science barak, 2001, On the (Im)possibility of Obfuscating Programs, Advances in Cryptology -CRYPTO LNCS 10.1145/336512.336559 costello, 0, Microsoft's digital rights management hacked loureiro, 2001, Mobile Code Protection goldreich, 2001, Foundations of Cryptography, 1, 10.1017/CBO9780511546891 10.1109/SECPRI.1997.601317 10.1007/BF02252866 loureiro, 2000, Mobile Code Protection with Smart Cards - A Position Paper, Proceedings of the 6th ECOOP Workshop on Mobile Object Systems