Protected Software Module Architectures
Autor: | Bart Preneel, Job Noorman, Ingrid Verbauwhede, Frank Piessens, Raoul Strackx |
---|---|
Přispěvatelé: | Reimer, Helmut, Pohlman, Norbert, Schneider, Wolfgang |
Rok vydání: | 2013 |
Předmět: | |
Zdroj: | ISSE 2013 Securing Electronic Business Processes ISBN: 9783658033705 ISSE |
DOI: | 10.1007/978-3-658-03371-2_21 |
Popis: | A significant fraction of Internet-connected computing devices is infected with malware. With the increased connectivity and software extensibility of embedded and industrial devices, this threat is now also relevant for our industrial infrastructure and our personal environments. Since many of these devices interact with remote parties for security-critical or privacy sensitive transactions, it is important to develop security architectures that allow a stakeholder to assess the trustworthiness of a computing device, and that allow such stakeholders to securely execute software on that device. Over the past decade, the security research community has proposed and evaluated such architectures. Important and promising examples are protected software module architectures. These architectures support the secure execution of small protected software modules even on devices that are malware infected. They also make it possible for remote parties to collect trust evidence about a device; the remote party can use the security architecture to collect measurements that give assurance that the device is in a trustworthy state. |
Databáze: | OpenAIRE |
Externí odkaz: |