Abstract
The work reported here is based on some research that I have done with my students Min Suk Kang, Miao Yu, Jun Zhao, and Zongwei Zhou.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Zongwei Zhou, Miao Yu, and Virgil Gligor. Dancing with Giants: Wimpy Kernels for On-demand Isolated I/O. In Proceedings of the IEEE Symposium on Security and Privacy, May 2014.
- 2.
Hao Chen, Drew Dean and David Wagner. Model Checking One Million Lines of C Code. In Proceedings of the 11th USENIX Security Symposium, pages 171–185, San Diego, CA, February 2002.
- 3.
Virgil Gligor. Security Limitations of Virtualization and How to Overcome Them. In Proceedings of the 18th International Workshop on Security Protocols (SPW-18), Cambridge, UK, March 2010, LNCS vol. 7061, Springer Verlag.
- 4.
Jonathan McCune, Yanlin Li, Ning Qu, Zongwei Zhou, Anupam Datta, Virgil Gligor, and Aadrian Perrig. TrustVisor: Efficient TCB Reduction and Attestation. Technical Report, CMU-CyLab-09-003, March, 2009. (also In Proceedings of the IEEE Symp. on Security and Privacy, Oakland, CA, May 2010.)
- 5.
Amit Vasudevan, Sagar Chaki, Limin Jia, Limin Jonathan McCune, James Newsome, and Anupam Datta. Design, Implementation and Verification of an eXtensible and Modular Hypervisor Framework. In Proceedings of the IEEE Symposium on Security and Privacy, 2013.
- 6.
Virgil D. Gligor and Bruce G. Lindsay. Object Migration and Authentication. In IEEE Transactions on Software Engineering, SE-5, No. 6, 1979, pp. 607–611.
- 7.
Virgil Gligor and Jeannette Wing. Towards a Theory of Trust in Networks of Humans and Computers. In Proceedings of the 19th International Workshop on Security Protocols (SPW-19), Cambridge, UK, March 2011. LNCS 7114, Springer Verlag.
- 8.
Tiffany Hyun-Jin Kim, Virgil Gligor, and Adrian Perrig. Street-Level Trust Semantics for Attribute Authentication. In Proceedings of the 20th International Workshop on Security Protocols (SPW-20), Cambridge, UK, April 2012, LNCS 7622, Springer Verlag.
- 9.
Sarbari Gupta and Virgil D. Gligor. Experience with a Penetration Analysis Method and Tool. In Proceedings of the 1992 National Computer Security Conference, Baltimore, Maryland, pp. 165 - 183.
- 10.
J.D. Weiss. A System Security Engineering Process. In Proceedings of the 14th National Computer Security Conference, Baltimore, Maryland, 1991.
- 11.
Edward G. Amoroso. Fundamentals of Computer Security Technology. Prentice-Hall, 1994, pp, 15–29, ISBN0131089293.
- 12.
Bruce Schneier. Attack Trees. In Dr. Dobb’s Journal, v. 24, n. 12, December 1999, pp. 21–29.
- 13.
Sjouke Mauw and Martijn Oosdijk. Foundations of Attack Trees. D. Won and S. Kim (Eds.), Proc. of the ICISC 2005, LNCS 3935, Springer Verlag, pp. 186–198.
- 14.
Eric M. Hutchins, Michael J. Clopper, and Rohan M. Amin. Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains. In Proceedings of the 6th Annual International Conference on Information Warfare and Security, Washington, DC, 2011.
- 15.
Jerome H. Saltzer and Michael D. Schroeder. The protection of information in computer systems. In Proceedings of the IEEE, Vol. 63, No. 9, pp. 1278–1308, September 1975.
- 16.
Rosarion Gennaro, Craig Gentry, and Bryan Parno. Non-Interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers. In Proceedings of CRYPTO 2010, Springer Verlag, August 2010.
- 17.
Zongwei Zhou, Jun Han, Yue-Hsun Lin, Adrian Perrig, and Virgil Gligor. KISS: “Key it Simple and Secure” Corporate Key Management. In Proceedings of the 5th International Conference on Trust and Trustworthy Computing (TRUST), London. 2013.
- 18.
Virgil D. Gligor, Bryan Parno, Ji Sun Shin. Network Adversary Attacks against Secure Encryption Schemes. Technical Report CMU-CyLab-10-001, January, 2010.
- 19.
Sanjit Chatterjee, Alfred Menezes, and Palash Sarkar. Another look at Tightness. In IACR Cryptology ePrint Archive 2011: 442 (2011).
- 20.
Philip Rogaway. On the Role of Definitions in and Beyond Cryptography. In Proceedings of ASIAN, pages 13–32, 2004.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Gligor, V. (2014). Dancing with the Adversary: A Tale of Wimps and Giants (Transcript of Discussion). In: Christianson, B., Malcolm, J., Matyáš, V., Švenda, P., Stajano, F., Anderson, J. (eds) Security Protocols XXII. Security Protocols 2014. Lecture Notes in Computer Science(), vol 8809. Springer, Cham. https://doi.org/10.1007/978-3-319-12400-1_12
Download citation
DOI: https://doi.org/10.1007/978-3-319-12400-1_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-12399-8
Online ISBN: 978-3-319-12400-1
eBook Packages: Computer ScienceComputer Science (R0)