Approaches to handling :10Trojan Horse' threats
Computers and Security
Securing intelligent adjuncts using trusted computing platform technology
Proceedings of the fourth working conference on smart card research and advanced applications on Smart card research and advanced applications
Semper--Secure Electronic Marketplace for Europe
Semper--Secure Electronic Marketplace for Europe
Trusted Computing: Security and Applications
Cryptologia
Foundations of security analysis and design IV
Robust combiners for software hardening
TRUST'10 Proceedings of the 3rd international conference on Trust and trustworthy computing
Security and trust in the italian legal digital signature framework
iTrust'05 Proceedings of the Third international conference on Trust Management
Hi-index | 0.00 |
Digital signatures are a key technology for many Internet-based commercial and administrative applications and, therefore, and increasingly popular target of attacks. Due to their strong cryptographic properties an attacker is more likely to subvert them with malicious software, ie Trojan horse programs. We show that by fusing two techniques, our WORM-supported reliable input method and the Intelligent Adjunct model of the Trusted Computing Platform Alliance, we can achieve a high degree of protection from Trojan horse programs during the process of creating digital signatures. Existing software products immediately benefit form our results. Moreover, we examine three ways of storing and executing the signing software the respect to its susceptibility to Trojan horse programs and identify the most suitable combination.