Security

Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware - Extended Version

Download Now Free registration required

Executive Summary

Software that covertly monitors user actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and removing it. Such software may be inadvertently installed by a user that is casually browsing the web, or may be purposely installed by an attacker or even the owner of a system. This is particularly problematic in the case of utility computing, early manifestations of which are Internet cafes and thin-client computing. Traditional trusted computing approaches offer a partial solution to this by significantly increasing the size of the Trusted Computing Base (TCB) to include the operating system and other software.

  • Format: PDF
  • Size: 1678.9 KB