Spy: a method to secure clients for network services
Tóm tắt
A fundamental problem in security is guaranteeing correct program behavior on an untrusted computer regardless of a user's actions. The problem appears in digital rights management, secure boot, e-appliances, etc. All existing approaches are either partial or unreliable. Today, dependable security is necessary not only for e-commerce, but also to ensure that, under critical conditions of information warfare, remote clients behave predictably and securely, and cannot compromise the infrastructure. We prove that the problem of correct program execution is unsolvable without adoption of a trusted hardware platform. Since it is impractical to consider as trusted a complex computer system, we identify the minimal hardware support that enables a complete solution. We propose two simple hardware mechanisms which require minimal change to the currently popular PC architecture: (i) the use of a trusted "sealed" computing device, the "spy", and (ii) a hardware interrupt, called "two minute warning", which has the highest priority and has a pre-defined time difference from any subsequent interrupt. Finally, we incrementally build upon this minimal hardware support larger and more complex applications with guaranteed security. We call this construction the inverse security pyramid.
Từ khóa
#Hardware #Military computing #Propagation losses #Computer security #Information security #Application software #Protection #Intellectual property #Content management #Computer industryTài liệu tham khảo
low, 1998, Java control flow obfuscation
macdonald, 0, On program security and obfuscation
monrose, 1999, Distributed Execution with Remote Audit, ISOC Network and Distributed System Security Symposium, 103
palmer, 0, An Introduction to Citadel - A Secure Crypto Coprocessor for Workstations, IFIP SEC’94 Curacao
sander, 1998, On Software Protection via Function Hiding, Proc 2nd Workshop Information Hiding, 111, 10.1007/3-540-49380-8_9
sander, 1998, Protecting Mobile Agents Against Malicious Hosts, Mobile Agents and Security LNCS 1419, 44, 10.1007/3-540-68671-1_4
10.1109/ISCC.2001.935348
yee, 1994, Secure Co-processors
10.1145/502034.502036
collberg, 1997, A Taxonomy of Obfuscating Transformations, Technical Report Technical Report TR-148 Department of Computer Science
barak, 2001, On the (Im)possibility of Obfuscating Programs, Advances in Cryptology -CRYPTO LNCS
10.1145/336512.336559
costello, 0, Microsoft's digital rights management hacked
loureiro, 2001, Mobile Code Protection
goldreich, 2001, Foundations of Cryptography, 1, 10.1017/CBO9780511546891
10.1109/SECPRI.1997.601317
10.1007/BF02252866
loureiro, 2000, Mobile Code Protection with Smart Cards - A Position Paper, Proceedings of the 6th ECOOP Workshop on Mobile Object Systems