Sciweavers

Share
ICICS
2005
Springer

Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware

10 years 9 months ago
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware
Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and removing it. Such software may be inadvertently installed by a user that is casually browsing the web, or may be purposely installed by an attacker, or even by the owner of a system to spy on other users of the system. This is particularly problematic in the case of utility computing, early manifestations of which are Internet cafes and thin-client computing. Traditional trusted computing approaches offer a partial solution to this by significantly increasing the size of the trusted computing base (TCB) to include the operating system and other software. We examine the problem of protecting a user accessing specific services in such an environment. We focus on secure video conferencing and remote desktop access when using any convenient, and often untrusted, terminal as two example applications. We posit that, a...
Debra L. Cook, Ricardo A. Baratto, Angelos D. Kero
Added 27 Jun 2010
Updated 27 Jun 2010
Type Conference
Year 2005
Where ICICS
Authors Debra L. Cook, Ricardo A. Baratto, Angelos D. Keromytis
Comments (0)
books