Abstract. A programmable secure coprocessor platform can help solve many security problems in distributed computing, particularly if coprocessor applications can participate as full-fledged parties in distributed cryptographic protocols. Thus, a generic platform must not only provide programmability, maintenance, and configuration in the hostile field, it must also provide outbound authentication for the entities that result. This paper offers our experiences in solving this problem for a high-end secure coprocessor product. This work required synthesis of a number of techniques, so that parties with different and dynamic views of trust can draw sound and complete conclusions about remote coprocessor applications
Security controls (such as encryption endpoints, payment gateways, and firewalls) rely on correct pr...
Our project applies automated proof checking to two application domains: protecting host computers f...
The need to increase the hostile attack resilience of distributed and internet-worked computer syste...
A programmable secure coprocessor platform can help solve many security problems in distributed com...
The Dyad project at Carnegie Mellon University is using physically secure coprocessors to achieve ne...
International audienceExciting new capabilities of modern trusted hardware technologies allow for th...
Cryptographic processing is a critical component of secure Internet-connected computing systems. Fur...
A fundamental concern in building a secure distributed system is authentication of local and remote ...
The preservation of physical security for computer systems has long been used as a foundation for co...
As the complexity of current software systems increases, we see a correlative increase in the number...
Highly concurrent environments, like the Internet, present new challenges towards design ofsecure cr...
We present a logic for reasoning about properties of secure systems. The logic is built around a con...
The wide usage of hardware intellectual property (IP) cores and software programs from untrusted thi...
The remote trust problem aims to address the issue of verifying the execution of a program running o...
The remote trust problem aims to address the issue of verifying the execution of a program running o...
Security controls (such as encryption endpoints, payment gateways, and firewalls) rely on correct pr...
Our project applies automated proof checking to two application domains: protecting host computers f...
The need to increase the hostile attack resilience of distributed and internet-worked computer syste...
A programmable secure coprocessor platform can help solve many security problems in distributed com...
The Dyad project at Carnegie Mellon University is using physically secure coprocessors to achieve ne...
International audienceExciting new capabilities of modern trusted hardware technologies allow for th...
Cryptographic processing is a critical component of secure Internet-connected computing systems. Fur...
A fundamental concern in building a secure distributed system is authentication of local and remote ...
The preservation of physical security for computer systems has long been used as a foundation for co...
As the complexity of current software systems increases, we see a correlative increase in the number...
Highly concurrent environments, like the Internet, present new challenges towards design ofsecure cr...
We present a logic for reasoning about properties of secure systems. The logic is built around a con...
The wide usage of hardware intellectual property (IP) cores and software programs from untrusted thi...
The remote trust problem aims to address the issue of verifying the execution of a program running o...
The remote trust problem aims to address the issue of verifying the execution of a program running o...
Security controls (such as encryption endpoints, payment gateways, and firewalls) rely on correct pr...
Our project applies automated proof checking to two application domains: protecting host computers f...
The need to increase the hostile attack resilience of distributed and internet-worked computer syste...