Export Citations
- Sponsor:
- sigsac
The fifth ACM workshop on Scalable Trusted Computing (STC) continues in the footsteps of past STC workshops. It focuses on fundamental technologies of trusted computing in a broad sense and its applications in large-scale systems -- those involving large number of users and parties with varying degrees of trust. STC is intended to serve as a forum for researchers as well as practitioners to disseminate and discuss recent advances and emerging issues. The program committee accepted five full papers (29% acceptance) and four short papers covering a variety of topics ranging from hardware security and mobile trusted computing to trusted virtual domains. The proceedings include two invited papers by leading experts in related fields: Gernot Heiser on trustworthy systems and David Lie on virtualization. In addition, the program features two wellestablished and well-known keynote addresses: Paul van Oorschot (Carleton University, Canada) delivers the academic keynote, while Michael Waidner (IBM Chief Technology Officer for Security) delivers the industrial keynote.
Proceeding Downloads
System security, platform security and usability
Scalable trusted computing seeks to apply and extend the fundamental technologies of trusted computing to large-scale systems. To provide the functionality demanded by users, bootstrapping a trusted platform is but the first of many steps in a complex, ...
The road to trustworthy systems
Computer systems are routinely deployed in life- and mission-critical situations, yet their security, safety or dependability can in most cases not be assured to the degree warranted by the application. In other words, trusted computer systems are ...
Using hypervisors to secure commodity operating systems
Hypervisors are an excellent tool for increasing the security of commodity software against attack. In this paper, we discuss some of the lessons and insights we gained from designing and implementing four research prototypes that use hypervisors to ...
Implementing an application-specific credential platform using late-launched mobile trusted module
Contemporary trusted execution environments provide a good foundation for implementing secure user credentials, but these are not properly bound to the application instances that implement their use. This paper introduces a framework for application-...
Towards customizable, application specific mobile trusted modules
Two different security extensions of mobile platforms for hosting Mobile Trusted Module (MTM) functionality have been introduced in recent years: the ARM TrustZone processor extension and Secure Elements. Both approaches can host MTMs which are ...
Small, stupid, and scalable: secure computing with faerieplay
How can Agnes trust a computation C occurring at Boris's computer? In particular, how can Agnes can trust that C is occurring without Boris even being able to observe its internal state? One way is for Agnes to house C in a strong tamper-protected ...
Hardware intrinsic security from D flip-flops
In this paper we describe the results of our investigations Supported by EU FP7 project UNIQUE on the randomness and reliability of D flip-flops when used as a Physically Unclonable Function (PUF). These D flip-flops are hardware components which ...
Trusted virtual containers on demand
TPM-based trusted computing aspires to use hardware and cryptography to provide a remote relying party with assurances about the trustworthiness of a computing environment. However, standard approaches to trusted computing are hampered in the areas of ...
Scalable integrity monitoring in virtualized environments
Use of trusted computing to achieve integrity guarantees remains limited due to the complexity of monitoring a large set of systems, the required changes to guest operating systems, and, e.g., relay attacks or time of measurement to time of reporting ...
Separating hypervisor trusted computing base supported by hardware
In this paper we explore how recent advances in virtualisation support for commodity hardware could be utilised to reduce the Trusted Computing Base (TCB) and improve the code separation of a hypervisor. To achieve this, we reassess on the definition of ...
The diversity of TPMs and its effects on development: a case study of integrating the TPM into OpenSolaris
Broad adoption of secure programming primitives such as the TPM can be hurt by programmer confusion regarding the nature and representation of failures when using a primitive. Conversely, a clear understanding of the primitive's failure modes is ...
Trusted virtual domains on OpenSolaris: usable secure desktop environments
Trusted Virtual Domains (TVDs) are a security concept to create separated domains over virtual and physical platforms. Since most existing TVD implementations focus on servers and data centers, there are only few efforts on secure desktop environments. ...