Playing Attack and Defense with Trusted Storage

Javier Gonzalez, Philippe Bonnet, Luc Bouganim

Publikation: Artikel i tidsskrift og konference artikel i tidsskriftKonferenceartikelForskningpeer review

Abstrakt

It is often convenient to assume in a data management plat- form that one or several computing devices are trusted, spe- cially when the goal is to provide privacy guarantees over personal data. But what does it take for a computing de- vice to be trusted? More specifically, how can a personal device provide trusted storage? This is the question we tackle in this demonstration. We describe how secure de- vices, equipped with a trusted execution environment, differ from general purpose devices. We illustrate with our demon- stration scenario, that it is much more difficult to attack a storage service running on a secure device, than to attack the same service running on a general purpose device.
OriginalsprogEngelsk
TidsskriftITUs skriftserie
Antal sider8
ISSN1500-7707
StatusUdgivet - 2014

Fingeraftryk

Dyk ned i forskningsemnerne om 'Playing Attack and Defense with Trusted Storage'. Sammen danner de et unikt fingeraftryk.

Citationsformater