COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring. |
University of Cambridge > Talks.cam > Computer Laboratory Security Seminar > Trustable Hardware as a TOCTOU Problem: Overview and Potential Remedies
Trustable Hardware as a TOCTOU Problem: Overview and Potential RemediesAdd to your list(s) Download to your calendar using vCal
If you have a question about this talk, please contact Jack Hughes. In this talk, we frame Trustable Hardware as a “Time of Check/Time of Use” (TOCTOU) problem. The basic problem with receiving a package containing “trusted hardware” is that the place of verification for hardware is physically distant and administratively distinct from the place of use. This is similar in nature to confirming the integrity of a web object by checking its hash on the server, then downloading it and running it. The talk starts by exploring some of the potential attack vectors in the supply chain, thus motivating the need for point-of-use verification. We then use these constraints to formulate a system architecture that tries to simplify the user verification problem, thus providing a method for evidence-based trust in a given hardware artifact, as opposed to blind faith in the supply chain. This talk is part of the Computer Laboratory Security Seminar series. This talk is included in these lists:
Note that ex-directory lists are not shown. |
Other listsCRASSH Behavioural and Clinical Neuroscience Seminars CUSAS Forum Speaker SeriesOther talksThe very real problem of imaginary energy in our data Virtual Lunchtime Talk - Civil Servants and Social Media: A minefield or the new frontier? ONLINE seminar: Myelin regeneration in the CNS: reversing the ravages of time Three-Dimensional Active Defect Loops The role of sensory inputs in generating and sustaining cognitive maps Cambridge Journal of Economics 2021 Conference |