|COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring.|
Building Trusted Systems with Protected Modules
If you have a question about this talk, please contact Wei Ming Khoo.
As businesses and individuals entrust more and more sensitive tasks (e.g., paying bills, shopping online, or accessing medical records) to computers, it becomes increasingly important to ensure this trust is warranted. However, users are understandably reluctant to abandon the low cost, high performance, and flexibility of today’s general-purpose computers. In this talk, I will describe Flicker, an architecture for constructing protected modules. Flicker demonstrates that we can satisfy the need for features and security by constructing an on-demand secure execution environment, using a combination of software techniques and recent commodity CPU enhancements. This provides a solid foundation for constructing secure systems that must coexist with standard software; the developer of a security-sensitive code module need only trust her own code, plus as few as 250 lines of Flicker code, for the secrecy and integrity of her code’s execution. However, for many applications, secrecy and integrity are insufficient; thus, I’ll discuss techniques for providing practical state continuity for protected modules. To ensure the correctness of our design, we develop formal, machine-verified proofs of safety. To demonstrate practicality, we have implemented our architectures on Linux and Windows running on AMD and Intel.
Dr Bryan Parno, Microsoft Research Redmond, received the 2010 Doctoral Dissertation Award from ACM for “resolving the tension between adequate security protections and the features and performance that users expect in a digitized world” and has recently co-authored the book “Bootstrapping Trust in Modern Computers” with Jon McCune and Adrian Perrig.
2010 ACM doctoral dissertation award:
Bootstrapping Trust in Modern Computers:
This talk is part of the Computer Laboratory Security Seminar series.
This talk is included in these lists:
Note that ex-directory lists are not shown.
Other listsBiochem Social Mobility: Chavs, NEETs and McJobs Ivory Tower Society, Pembroke College
Other talks"There's something wrong with my MAM; the ER-mitochondria axis and neurodegenerative diseases" Emergency psychiatry Britain and the Continent: two thousand years of unpredictability EU Life Lecture - "Genomic approaches to study chromosome architecture and function" From Infinite to Finite Programs: Explicit Error Bounds with Applications to Approximate Dynamic Programming Neuronal signals for reward risk and formal economic utility