skip to main content
10.1145/1867635acmconferencesBook PagePublication PagesccsConference Proceedingsconference-collections
STC '10: Proceedings of the fifth ACM workshop on Scalable trusted computing
ACM2010 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
CCS '10: 17th ACM Conference on Computer and Communications Security 2010 Chicago Illinois USA 4 October 2010
ISBN:
978-1-4503-0095-7
Published:
04 October 2010
Sponsors:
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN
Next Conference
October 13 - 17, 2025
Taipei , Taiwan
Skip Abstract Section
Abstract

The fifth ACM workshop on Scalable Trusted Computing (STC) continues in the footsteps of past STC workshops. It focuses on fundamental technologies of trusted computing in a broad sense and its applications in large-scale systems -- those involving large number of users and parties with varying degrees of trust. STC is intended to serve as a forum for researchers as well as practitioners to disseminate and discuss recent advances and emerging issues. The program committee accepted five full papers (29% acceptance) and four short papers covering a variety of topics ranging from hardware security and mobile trusted computing to trusted virtual domains. The proceedings include two invited papers by leading experts in related fields: Gernot Heiser on trustworthy systems and David Lie on virtualization. In addition, the program features two wellestablished and well-known keynote addresses: Paul van Oorschot (Carleton University, Canada) delivers the academic keynote, while Michael Waidner (IBM Chief Technology Officer for Security) delivers the industrial keynote.

Skip Table Of Content Section
keynote
System security, platform security and usability

Scalable trusted computing seeks to apply and extend the fundamental technologies of trusted computing to large-scale systems. To provide the functionality demanded by users, bootstrapping a trusted platform is but the first of many steps in a complex, ...

SESSION: Invited papers
invited-talk
The road to trustworthy systems

Computer systems are routinely deployed in life- and mission-critical situations, yet their security, safety or dependability can in most cases not be assured to the degree warranted by the application. In other words, trusted computer systems are ...

invited-talk
Using hypervisors to secure commodity operating systems

Hypervisors are an excellent tool for increasing the security of commodity software against attack. In this paper, we discuss some of the lessons and insights we gained from designing and implementing four research prototypes that use hypervisors to ...

SESSION: Full papers
research-article
Implementing an application-specific credential platform using late-launched mobile trusted module

Contemporary trusted execution environments provide a good foundation for implementing secure user credentials, but these are not properly bound to the application instances that implement their use. This paper introduces a framework for application-...

research-article
Towards customizable, application specific mobile trusted modules

Two different security extensions of mobile platforms for hosting Mobile Trusted Module (MTM) functionality have been introduced in recent years: the ARM TrustZone processor extension and Secure Elements. Both approaches can host MTMs which are ...

research-article
Small, stupid, and scalable: secure computing with faerieplay

How can Agnes trust a computation C occurring at Boris's computer? In particular, how can Agnes can trust that C is occurring without Boris even being able to observe its internal state? One way is for Agnes to house C in a strong tamper-protected ...

research-article
Hardware intrinsic security from D flip-flops

In this paper we describe the results of our investigations Supported by EU FP7 project UNIQUE on the randomness and reliability of D flip-flops when used as a Physically Unclonable Function (PUF). These D flip-flops are hardware components which ...

research-article
Trusted virtual containers on demand

TPM-based trusted computing aspires to use hardware and cryptography to provide a remote relying party with assurances about the trustworthiness of a computing environment. However, standard approaches to trusted computing are hampered in the areas of ...

SESSION: Short papers
short-paper
Scalable integrity monitoring in virtualized environments

Use of trusted computing to achieve integrity guarantees remains limited due to the complexity of monitoring a large set of systems, the required changes to guest operating systems, and, e.g., relay attacks or time of measurement to time of reporting ...

short-paper
Separating hypervisor trusted computing base supported by hardware

In this paper we explore how recent advances in virtualisation support for commodity hardware could be utilised to reduce the Trusted Computing Base (TCB) and improve the code separation of a hypervisor. To achieve this, we reassess on the definition of ...

short-paper
The diversity of TPMs and its effects on development: a case study of integrating the TPM into OpenSolaris

Broad adoption of secure programming primitives such as the TPM can be hurt by programmer confusion regarding the nature and representation of failures when using a primitive. Conversely, a clear understanding of the primitive's failure modes is ...

short-paper
Trusted virtual domains on OpenSolaris: usable secure desktop environments

Trusted Virtual Domains (TVDs) are a security concept to create separated domains over virtual and physical platforms. Since most existing TVD implementations focus on servers and data centers, there are only few efforts on secure desktop environments. ...

Contributors
  • University of Colorado at Colorado Springs
  • University of Waterloo
  • Technical University of Darmstadt

Recommendations

Acceptance Rates

STC '10 Paper Acceptance Rate 9 of 17 submissions, 53%;
Overall Acceptance Rate 17 of 31 submissions, 55%
YearSubmittedAcceptedRate
STC '1214857%
STC '1017953%
Overall311755%