COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring. |
University of Cambridge > Talks.cam > Computer Laboratory Security Seminar > Building Trusted Systems with Protected Modules
Building Trusted Systems with Protected ModulesAdd to your list(s) Download to your calendar using vCal
If you have a question about this talk, please contact Wei Ming Khoo. As businesses and individuals entrust more and more sensitive tasks (e.g., paying bills, shopping online, or accessing medical records) to computers, it becomes increasingly important to ensure this trust is warranted. However, users are understandably reluctant to abandon the low cost, high performance, and flexibility of today’s general-purpose computers. In this talk, I will describe Flicker, an architecture for constructing protected modules. Flicker demonstrates that we can satisfy the need for features and security by constructing an on-demand secure execution environment, using a combination of software techniques and recent commodity CPU enhancements. This provides a solid foundation for constructing secure systems that must coexist with standard software; the developer of a security-sensitive code module need only trust her own code, plus as few as 250 lines of Flicker code, for the secrecy and integrity of her code’s execution. However, for many applications, secrecy and integrity are insufficient; thus, I’ll discuss techniques for providing practical state continuity for protected modules. To ensure the correctness of our design, we develop formal, machine-verified proofs of safety. To demonstrate practicality, we have implemented our architectures on Linux and Windows running on AMD and Intel. Bio Dr Bryan Parno, Microsoft Research Redmond, received the 2010 Doctoral Dissertation Award from ACM for “resolving the tension between adequate security protections and the features and performance that users expect in a digitized world” and has recently co-authored the book “Bootstrapping Trust in Modern Computers” with Jon McCune and Adrian Perrig. 2010 ACM doctoral dissertation award: http://www.acm.org/press-room/news-releases/2011/dd-award-2010 Bootstrapping Trust in Modern Computers: http://www.springerlink.com/content/k16537/ This talk is part of the Computer Laboratory Security Seminar series. This talk is included in these lists:
Note that ex-directory lists are not shown. |
Other listsHuman-Computer Interaction Molecular, Structural & Cellular Microbiology Energy Innovation Beyond 2013: A talk by the Global Director of BP VenturesOther talksRetinal mechanisms of non-image-forming vision Changing languages in European Higher Education: from official policies to unofficial classroom practices “This object has been temporarily removed” On the climate change conversation Ethics for the working mathematician, seminar 8: Standing on the shoulders of giants. Double talk on Autism genetics Microtubule Modulation of Myocyte Mechanics Computing High Resolution Health(care) Formation and disease relevance of axonal endoplasmic reticulum, a "neuron within a neuron”. Structural basis for human mitochondrial DNA replication, repair and antiviral drug toxicity Existence of Lefschetz fibrations on Stein/Weinstein domains Hydrogen-Deuterium Exchange Mass Spectrometry |