Secure computing using cryptographic assurance of execution correctness

被引:1
|
作者
Pierson, LG [1 ]
Campbell, PL [1 ]
Eldridge, JM [1 ]
Robertson, PJ [1 ]
Tarman, TD [1 ]
Witzke, EL [1 ]
机构
[1] Sandia Natl Labs, Albuquerque, NM 87185 USA
关键词
trusted objects; faithful execution; execution correctness; encryption; encrypted objects; secure computer architecture;
D O I
10.1109/CCST.2004.1405399
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Current computing architectures are "inherently insecure" because they are designed to execute ANY arbitrary sequence of instructions. As a result they are subject to subversion by malicious code. Our goal is to produce a cryptographic method of "tamper-proofing" trusted code over a large portion of the software life cycle. We have developed a technique called "Faithful Execution", to cryptographically protect instruction sequences from subversion. This paper presents an overview of, and the lessons learned from, our implementations of Faithful Execution in a Java Virtual Machine prototype and also in a configurable soft-core processor implemented in a Field Programmable Gate Array (FPGA).
引用
收藏
页码:239 / 246
页数:8
相关论文
共 50 条
  • [1] Cryptographic Protocols for Secure Cloud Computing
    Alhumrani, S. A.
    Kar, Jayaprakash
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (02): : 301 - 310
  • [2] A Cryptographic Scheme for Secure Cloud Computing
    Llamas, Alejandro
    Ernesto Gonzalez, Raul
    [J]. 2013 10TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTING SCIENCE AND AUTOMATIC CONTROL (CCE), 2013, : 221 - 226
  • [3] Execution Assurance for Massive Computing Tasks
    Wang, Ting
    Liu, Ling
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2010, E93D (06): : 1343 - 1351
  • [4] Alternative correctness criteria for concurrent execution of transactions in multilevel secure databases
    Atluri, V
    Jajodia, S
    Bertino, E
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 1996, 8 (05) : 839 - 854
  • [5] A Multiple Equivalent Execution Trace Approach to Secure Cryptographic Embedded Software
    Agosta, Giovanni
    Barenghi, Alessandro
    Pelosi, Gerardo
    Scandale, Michele
    [J]. 2014 51ST ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2014,
  • [6] Towards a high assurance secure computing platform
    DiRossi, Michael D.
    [J]. HASE 2007: 10TH IEEE HIGH ASSURANCE SYSTEMS ENGINEERING SYMPOSIUM, PROCEEDINGS, 2007, : 381 - 382
  • [7] Secure routing using factual correctness
    Muthuprasanna, Muthusrinivasan
    Manimaran, Govindarasu
    [J]. NETWORKING 2006: NETWORKING TECHNOLOGIES, SERVICES, AND PROTOCOLS; PERFORMANCE OF COMPUTER AND COMMUNICATION NETWORKS; MOBILE AND WIRELESS COMMUNICATIONS SYSTEMS, 2006, 3976 : 1197 - 1203
  • [8] A secure cryptographic cloud communication using DNA cryptographic technique
    Goyal, Shruti
    Jain, Sourabh
    [J]. 2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 3, 2015, : 791 - 798
  • [9] Towards a Comprehensive Solution for Secure Cryptographic Protocol Execution based on Runtime Verification
    Colombo, Christian
    Vella, Mark
    [J]. ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 765 - 774
  • [10] RV-TEE: secure cryptographic protocol execution based on runtime verification
    Vella, Mark
    Colombo, Christian
    Abela, Robert
    Spacek, Peter
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2021, 17 (03) : 229 - 248