Items related to Trust Extension as a Mechanism for Secure Code Execution...

Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers (ACM Books) - Softcover

 
9781627054775: Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers (ACM Books)

Synopsis

As society rushes to digitize sensitive information and services, it is imperative to adopt adequate security protections. However, such protections fundamentally conflict with the benefits we expect from commodity computers. In other words, consumers and businesses value commodity computers because they provide good performance and an abundance of features at relatively low costs. Meanwhile, attempts to build secure systems from the ground up typically abandon such goals, and hence are seldom adopted. In this book, I argue that we can resolve the tension between security and features by leveraging the trust a user has in one device to enable her to securely use another commodity device or service, without sacrificing the performance and features expected of commodity systems. At a high level, we support this premise by developing techniques to allow a user to employ a small, trusted, portable device to securely learn what code is executing on her local computer. Rather than entrusting her data to the mountain of buggy code likely running on her computer, we construct an on-demand secure execution environment which can perform security-sensitive tasks and handle private data in complete isolation from all other software (and most hardware) on the system. Meanwhile, non-security-sensitive software retains the same abundance of features and performance it enjoys today. Having established an environment for secure code execution on an individual computer, we then show how to extend trust in this environment to network elements in a secure and efficient manner. This allows us to reexamine the design of network protocols and defenses, since we can now execute code on endhosts and trust the results within the network. Lastly, we extend the user's trust one more step to encompass computations performed on a remote host (e.g., in the cloud). We design, analyze, and prove secure a protocol that allows a user to outsource arbitrary computations to commodity computers run by an untrusted remote party (or parties) who may subject the computers to both software and hardware attacks. Our protocol guarantees that the user can both verify that the results returned are indeed the correct results of the specified computations on the inputs provided, and protect the secrecy of both the inputs and outputs of the computations. These guarantees are provided in a non-interactive, asymptotically optimal (with respect to CPU and bandwidth) manner. Thus, extending a user's trust, via software, hardware, and cryptographic techniques, allows us to provide strong security protections for both local and remote computations on sensitive data, while still preserving the performance and features of commodity computers.

"synopsis" may belong to another edition of this title.

About the Author

Bryan Parno works in the Security and Privacy Research Group at Microsoft Research. He completed his Ph.D. at Carnegie Mellon University under the supervision of Adrian Perrig, after receiving a Bachelor's degree from Harvard College. Dr. Parno's dissertation won the 2010 ACM Doctoral Dissertation Award.He has continued his work on verifiable computation, receiving a Best Paper Award at the IEEE Symposium on Security and Privacy for advances in that area. In 2011, he coauthored the book Bootstrapping Trust in Modern Computers. His work on security for new application models received a Best Practical Paper Award at the IEEE Symposium on Security and Privacy and a Best Paper Award at the USENIX Symposium on Networked Systems Design and Implementation. He has recently extended his interest in bootstrapping trust to the problem of building practical, formally verified secure systems. His other research interests include user authentication, secure network protocols, and security in constrained environments (e.g., RFID tags, sensor networks, and vehicles).

"About this title" may belong to another edition of this title.

  • PublisherMorgan & Claypool Publishers
  • Publication date2014
  • ISBN 10 1627054774
  • ISBN 13 9781627054775
  • BindingPaperback
  • LanguageEnglish
  • Number of pages207

Buy Used

Condition: Very Good
Fast Shipping - Safe and Secure...
View this item

£ 3 shipping within U.S.A.

Destination, rates & speeds

Search results for Trust Extension as a Mechanism for Secure Code Execution...

Stock Image

Parno, Bryan Jeffrey
Published by ACM Books, 2014
ISBN 10: 1627054774 ISBN 13: 9781627054775
Used paperback

Seller: suffolkbooks, Center moriches, NY, U.S.A.

Seller rating 4 out of 5 stars 4-star rating, Learn more about seller ratings

paperback. Condition: Very Good. Fast Shipping - Safe and Secure 7 days a week! Seller Inventory # 3TWOWA001NUJ

Contact seller

Buy Used

£ 18.11
Convert currency
Shipping: £ 3
Within U.S.A.
Destination, rates & speeds

Quantity: 3 available

Add to basket

Stock Image

Parno, Bryan Jeffrey
Published by ACM Books, 2014
ISBN 10: 1627054774 ISBN 13: 9781627054775
New Softcover

Seller: Lucky's Textbooks, Dallas, TX, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Condition: New. Seller Inventory # ABLIING23Mar2811580170368

Contact seller

Buy New

£ 51.68
Convert currency
Shipping: £ 3
Within U.S.A.
Destination, rates & speeds

Quantity: Over 20 available

Add to basket

Stock Image

Bryan Jeffrey Parno
Published by MP-ACM ACM Books, 2014
ISBN 10: 1627054774 ISBN 13: 9781627054775
New PAP
Print on Demand

Seller: PBShop.store UK, Fairford, GLOS, United Kingdom

Seller rating 4 out of 5 stars 4-star rating, Learn more about seller ratings

PAP. Condition: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # L0-9781627054775

Contact seller

Buy New

£ 54.37
Convert currency
Shipping: £ 4.16
From United Kingdom to U.S.A.
Destination, rates & speeds

Quantity: Over 20 available

Add to basket

Stock Image

Parno, Bryan Jeffrey
Published by ACM Books, 2014
ISBN 10: 1627054774 ISBN 13: 9781627054775
New Softcover

Seller: California Books, Miami, FL, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Condition: New. Seller Inventory # I-9781627054775

Contact seller

Buy New

£ 58.84
Convert currency
Shipping: FREE
Within U.S.A.
Destination, rates & speeds

Quantity: Over 20 available

Add to basket

Stock Image

Bryan Jeffrey Parno
Published by MP-ACM ACM Books, 2014
ISBN 10: 1627054774 ISBN 13: 9781627054775
New PAP
Print on Demand

Seller: PBShop.store US, Wood Dale, IL, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

PAP. Condition: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # L0-9781627054775

Contact seller

Buy New

£ 59.04
Convert currency
Shipping: FREE
Within U.S.A.
Destination, rates & speeds

Quantity: Over 20 available

Add to basket

Stock Image

Parno, Bryan Jeffrey
Published by ACM Books, 2014
ISBN 10: 1627054774 ISBN 13: 9781627054775
New Softcover

Seller: Ria Christie Collections, Uxbridge, United Kingdom

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Condition: New. In. Seller Inventory # ria9781627054775_new

Contact seller

Buy New

£ 53.55
Convert currency
Shipping: £ 11.98
From United Kingdom to U.S.A.
Destination, rates & speeds

Quantity: Over 20 available

Add to basket

Stock Image

Bryan Jeffrey Parno
Published by Morgan & Claypool Publishers, 2014
ISBN 10: 1627054774 ISBN 13: 9781627054775
New Paperback / softback
Print on Demand

Seller: THE SAINT BOOKSTORE, Southport, United Kingdom

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Paperback / softback. Condition: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days 398. Seller Inventory # C9781627054775

Contact seller

Buy New

£ 63.91
Convert currency
Shipping: £ 10.73
From United Kingdom to U.S.A.
Destination, rates & speeds

Quantity: Over 20 available

Add to basket

Stock Image

Parno, Bryan
Published by Morgan & Claypool, 2015
ISBN 10: 1627054774 ISBN 13: 9781627054775
New Paperback

Seller: Revaluation Books, Exeter, United Kingdom

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Paperback. Condition: Brand New. 188 pages. 9.00x7.50x0.50 inches. In Stock. Seller Inventory # x-1627054774

Contact seller

Buy New

£ 73.98
Convert currency
Shipping: £ 10
From United Kingdom to U.S.A.
Destination, rates & speeds

Quantity: 2 available

Add to basket

Seller Image

Bryan Jeffrey Parno
Published by ACM Books, 2014
ISBN 10: 1627054774 ISBN 13: 9781627054775
New Taschenbuch
Print on Demand

Seller: AHA-BUCH GmbH, Einbeck, Germany

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Taschenbuch. Condition: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - As society rushes to digitize sensitive information and services, it is imperative to adopt adequate security protections. However, such protections fundamentally conflict with the benefits we expect from commodity computers. In other words, consumers and businesses value commodity computers because they provide good performance and an abundance of features at relatively low costs. Meanwhile, attempts to build secure systems from the ground up typically abandon such goals, and hence are seldomadopted.In this book, I argue that we can resolve the tension between security and features by leveraging the trust a user has in one device to enable her to securely use another commodity device or service, without sacrificing the performance and features expected of commodity systems. At a high level, we support this premise by developing techniques to allow a user to employ a small, trusted, portable device to securely learn what code is executing on her local computer. Rather than entrusting her data to the mountain of buggy code likely running on her computer, we construct an on-demand secure execution environment which can perform security-sensitive tasks and handle private data in complete isolation from all other software (and most hardware) on the system. Meanwhile, non-security-sensitive software retains the same abundance of features and performance it enjoys today.Having established an environment for secure code execution on an individual computer, we then show how to extend trust in this environment to network elements in a secure and efficient manner. This allows us to reexamine the design of network protocols and defenses, since we can now execute code on endhosts and trust the results within the network. Lastly, we extend the user's trust one more step to encompass computations performed on a remote host (e.g., in the cloud). We design, analyze, and prove secure a protocol that allows a user to outsource arbitrary computations to commodity computers run by an untrusted remote party (or parties) who may subject the computers to both software and hardware attacks. Our protocol guarantees that the user can both verify that the results returned are indeed the correct results of the specified computations on the inputs provided, and protect the secrecy of both the inputs and outputs of the computations. These guarantees are provided in a non-interactive, asymptotically optimal (with respect to CPU and bandwidth) manner.Thus, extending a user's trust, via software, hardware, and cryptographic techniques, allows us to provide strong security protections for both local and remote computations on sensitive data, while still preserving the performance and features of commodity computers. Seller Inventory # 9781627054775

Contact seller

Buy New

£ 82.87
Convert currency
Shipping: £ 25.36
From Germany to U.S.A.
Destination, rates & speeds

Quantity: 1 available

Add to basket

Seller Image

Bryan Jeffrey Parno
ISBN 10: 1627054774 ISBN 13: 9781627054775
New Softcover
Print on Demand

Seller: moluna, Greven, Germany

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Condition: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. As society rushes to digitize sensitive information and services, it is imperative to adopt adequate security protections. This book argues that we can resolve the tension between security and features by leveraging the trust a user has in one device to ena. Seller Inventory # 4267830

Contact seller

Buy New

£ 73.39
Convert currency
Shipping: £ 41.43
From Germany to U.S.A.
Destination, rates & speeds

Quantity: Over 20 available

Add to basket