|COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring.|
Towards open trusted computing frameworks
If you have a question about this talk, please contact Saar Drimer.
This talk will summarise the results of, and motivation for, my master’s thesis, which looked at the feasibility of a trusted computing framework built from entirely open components. Each component was required to be as inspect-able and verifiable as possible, and therefore be trusted by its users.
I will discuss in some detail a novel insertion attack against certain trusted computing frameworks built upon the Trusted Computing Group’s Trusted Computing Module. Our insertion attack makes use of a vulnerability that arises due to the architecture of the TPM itself, and was published at COMPSAC 2006 .
Matt Barrett graduated from the University of Auckland’s Computer Science Department (http://www.cs.auckland.ac.nz) with a MSc (Hons, 1st Class) in 2005. His thesis was titled ‘Towards an Open Trusted Computing Framework,’ available at http://www.cs.auckland.ac.nz/~cthombor/Students/mbarrett/mbarrettThesis.htm. Since then, he has been living and working in London. Previous research has included Microsoft’s now defunct Next-Generation Secure Computing Base.
This talk is part of the Computer Laboratory Security Seminar series.
This talk is included in these lists:
Note that ex-directory lists are not shown.
Other listsCambridge Interdisciplinary Reproduction Forum Cambridge Area Sequencing Informatics Meeting VII (2015) Lattice field theory informal seminars
Other talksThe 2015 Sleep Summit Leveraging a Semantically Annotated Corpus to Disambiguate Prepositional Phrase Attachment Chupja--PHY Covert Channels: Can you see the Idles? ICASSP presentations Groundhog or Hound Dog? Is it time for arts impact evaluation to get a bit more rock and roll? Erotic Literature: Adaptation and Translation in Europe and Asia