Authenticated Operation of Open Computing Devices

  • Authors:
  • Paul England;Marcus Peinado

  • Affiliations:
  • -;-

  • Venue:
  • ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
  • Year:
  • 2002

Quantified Score

Hi-index 0.00

Visualization

Abstract

We describe how an open computing device can be extended to allow individual programs and operating systems to have exclusive access to cryptographic keys. This problem is of fundamental importance in areas such as virus protection, protection of servers from network attacks, network administration and copy protection. We seek a system that can be unconditionally robust against software attacks. This requires measures in hardware and in software. Our analysis allows us to minimize the amount of additional hardware needed to support the system.