Trust Extension As a Mechanism for Secure Code Execution on Commodity Computers
Title | Trust Extension As a Mechanism for Secure Code Execution on Commodity Computers |
Publication Type | Book |
Year of Publication | 2014 |
Authors | Parno, Bryan Jeffery |
Publisher | Association for Computing Machinery and Morgan &\#38; Claypool |
City | New York, NY, USA |
ISBN Number | 978-1-62705-477-5 |
Abstract | From the Preface As society rushes to digitize sensitive information and services, it is imperative that we adopt adequate security protections. However, such protections fundamentally conflict with the benefits we expect from commodity computers. In other words, consumers and businesses value commodity computers because they provide good performance and an abundance of features at relatively low costs. Meanwhile, attempts to build secure systems from the ground up typically abandon such goals, and hence are seldom adopted [Karger et al. 1991, Gold et al. 1984, Ames 1981]. In this book, a revised version of my doctoral dissertation, originally written while studying at Carnegie Mellon University, I argue that we can resolve the tension between security and features by leveraging the trust a user has in one device to enable her to securely use another commodity device or service, without sacrificing the performance and features expected of commodity systems.We support this premise over the course of the following chapters. Introduction. This chapter introduces the notion of bootstrapping trust from one device or service to another and gives an overview of how the subsequent chapters fit together. Thus, extending a user's trust, via software, hardware, and cryptographic techniques, allows us to provide strong security protections for both local and remote computations on sensitive data, while still preserving the performance and features of commodity computers. |
URL | https://dl.acm.org/citation.cfm?id=2611399 |
DOI | 10.1145/2611399 |
Citation Key | Parno:2014:TEM:2611399 |