Skip to main content

Dancing with the Adversary: A Tale of Wimps and Giants (Transcript of Discussion)

  • Conference paper
  • First Online:
Security Protocols XXII (Security Protocols 2014)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8809))

Included in the following conference series:

Abstract

The work reported here is based on some research that I have done with my students Min Suk Kang, Miao Yu, Jun Zhao, and Zongwei Zhou.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Zongwei Zhou, Miao Yu, and Virgil Gligor. Dancing with Giants: Wimpy Kernels for On-demand Isolated I/O. In Proceedings of the IEEE Symposium on Security and Privacy, May 2014.

  2. 2.

    Hao Chen, Drew Dean and David Wagner. Model Checking One Million Lines of C Code. In Proceedings of the 11th USENIX Security Symposium, pages 171–185, San Diego, CA, February 2002.

  3. 3.

    Virgil Gligor. Security Limitations of Virtualization and How to Overcome Them. In Proceedings of the 18th International Workshop on Security Protocols (SPW-18), Cambridge, UK, March 2010, LNCS vol. 7061, Springer Verlag.

  4. 4.

    Jonathan McCune, Yanlin Li, Ning Qu, Zongwei Zhou, Anupam Datta, Virgil Gligor, and Aadrian Perrig. TrustVisor: Efficient TCB Reduction and Attestation. Technical Report, CMU-CyLab-09-003, March, 2009. (also In Proceedings of the IEEE Symp. on Security and Privacy, Oakland, CA, May 2010.)

  5. 5.

    Amit Vasudevan, Sagar Chaki, Limin Jia, Limin Jonathan McCune, James Newsome, and Anupam Datta. Design, Implementation and Verification of an eXtensible and Modular Hypervisor Framework. In Proceedings of the IEEE Symposium on Security and Privacy, 2013.

  6. 6.

    Virgil D. Gligor and Bruce G. Lindsay. Object Migration and Authentication. In IEEE Transactions on Software Engineering, SE-5, No. 6, 1979, pp. 607–611.

  7. 7.

    Virgil Gligor and Jeannette Wing. Towards a Theory of Trust in Networks of Humans and Computers. In Proceedings of the 19th International Workshop on Security Protocols (SPW-19), Cambridge, UK, March 2011. LNCS 7114, Springer Verlag.

  8. 8.

    Tiffany Hyun-Jin Kim, Virgil Gligor, and Adrian Perrig. Street-Level Trust Semantics for Attribute Authentication. In Proceedings of the 20th International Workshop on Security Protocols (SPW-20), Cambridge, UK, April 2012, LNCS 7622, Springer Verlag.

  9. 9.

    Sarbari Gupta and Virgil D. Gligor. Experience with a Penetration Analysis Method and Tool. In Proceedings of the 1992 National Computer Security Conference, Baltimore, Maryland, pp. 165 - 183.

  10. 10.

    J.D. Weiss. A System Security Engineering Process. In Proceedings of the 14th National Computer Security Conference, Baltimore, Maryland, 1991.

  11. 11.

    Edward G. Amoroso. Fundamentals of Computer Security Technology. Prentice-Hall, 1994, pp, 15–29, ISBN0131089293.

  12. 12.

    Bruce Schneier. Attack Trees. In Dr. Dobb’s Journal, v. 24, n. 12, December 1999, pp. 21–29.

  13. 13.

    Sjouke Mauw and Martijn Oosdijk. Foundations of Attack Trees. D. Won and S. Kim (Eds.), Proc. of the ICISC 2005, LNCS 3935, Springer Verlag, pp. 186–198.

  14. 14.

    Eric M. Hutchins, Michael J. Clopper, and Rohan M. Amin. Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains. In Proceedings of the 6th Annual International Conference on Information Warfare and Security, Washington, DC, 2011.

  15. 15.

    Jerome H. Saltzer and Michael D. Schroeder. The protection of information in computer systems. In Proceedings of the IEEE, Vol. 63, No. 9, pp. 1278–1308, September 1975.

  16. 16.

    Rosarion Gennaro, Craig Gentry, and Bryan Parno. Non-Interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers. In Proceedings of CRYPTO 2010, Springer Verlag, August 2010.

  17. 17.

    Zongwei Zhou, Jun Han, Yue-Hsun Lin, Adrian Perrig, and Virgil Gligor. KISS: “Key it Simple and Secure” Corporate Key Management. In Proceedings of the 5th International Conference on Trust and Trustworthy Computing (TRUST), London. 2013.

  18. 18.

    Virgil D. Gligor, Bryan Parno, Ji Sun Shin. Network Adversary Attacks against Secure Encryption Schemes. Technical Report CMU-CyLab-10-001, January, 2010.

  19. 19.

    Sanjit Chatterjee, Alfred Menezes, and Palash Sarkar. Another look at Tightness. In IACR Cryptology ePrint Archive 2011: 442 (2011).

  20. 20.

    Philip Rogaway. On the Role of Definitions in and Beyond Cryptography. In Proceedings of ASIAN, pages 13–32, 2004.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Virgil Gligor .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Gligor, V. (2014). Dancing with the Adversary: A Tale of Wimps and Giants (Transcript of Discussion). In: Christianson, B., Malcolm, J., Matyáš, V., Švenda, P., Stajano, F., Anderson, J. (eds) Security Protocols XXII. Security Protocols 2014. Lecture Notes in Computer Science(), vol 8809. Springer, Cham. https://doi.org/10.1007/978-3-319-12400-1_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-12400-1_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-12399-8

  • Online ISBN: 978-3-319-12400-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics