Advertisement

Bootstrapping Trust in Modern Computers

  • Bryan Parno
  • Jonathan M. McCune
  • Adrian Perrig

Part of the SpringerBriefs in Computer Science book series (BRIEFSCOMPUTER, volume 10)

Table of contents

  1. Front Matter
    Pages i-xv
  2. Bryan Parno, Jonathan M. McCune, Adrian Perrig
    Pages 1-2
  3. Bryan Parno, Jonathan M. McCune, Adrian Perrig
    Pages 3-11
  4. Bryan Parno, Jonathan M. McCune, Adrian Perrig
    Pages 13-18
  5. Bryan Parno, Jonathan M. McCune, Adrian Perrig
    Pages 19-24
  6. Bryan Parno, Jonathan M. McCune, Adrian Perrig
    Pages 25-33
  7. Bryan Parno, Jonathan M. McCune, Adrian Perrig
    Pages 35-40
  8. Bryan Parno, Jonathan M. McCune, Adrian Perrig
    Pages 41-50
  9. Bryan Parno, Jonathan M. McCune, Adrian Perrig
    Pages 51-52
  10. Bryan Parno, Jonathan M. McCune, Adrian Perrig
    Pages 53-57
  11. Bryan Parno, Jonathan M. McCune, Adrian Perrig
    Pages 59-60
  12. Bryan Parno, Jonathan M. McCune, Adrian Perrig
    Pages 61-72
  13. Bryan Parno, Jonathan M. McCune, Adrian Perrig
    Pages 73-74
  14. Bryan Parno, Jonathan M. McCune, Adrian Perrig
    Pages 75-76
  15. Bryan Parno, Jonathan M. McCune, Adrian Perrig
    Pages 77-77
  16. Back Matter
    Pages 79-101

About this book

Introduction

Trusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer's state. We examine research on securely capturing a computer's state, and consider the utility of this information both for improving security on the local computer (e.g., to convince the user that her computer is not infected with malware) and for communicating a remote computer's state (e.g., to enable the user to check that a web server will adequately protect her data). Although the recent "Trusted Computing" initiative has drawn both positive and negative attention to this area, we consider the older and broader topic of bootstrapping trust in a computer. We cover issues ranging from the wide collection of secure hardware that can serve as a foundation for trust, to the usability issues that arise when trying to convey computer state information to humans. This approach unifies disparate research efforts and highlights opportunities for additional work that can guide real-world improvements in computer security.

Keywords

Bootstrapping Root of Trust Secure Boot Secure Hardware Trusted Computing Trusted Platform Module

Authors and affiliations

  • Bryan Parno
    • 1
  • Jonathan M. McCune
    • 2
  • Adrian Perrig
    • 3
  1. 1.Microsoft ResearchRedmondUSA
  2. 2.Carnegie Mellon UniversityCyLabPittsburghUSA
  3. 3.Carnegie Mellon UniversityCyLabPittsburghUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-1-4614-1460-5
  • Copyright Information The Author(s) 2011
  • Publisher Name Springer, New York, NY
  • eBook Packages Computer Science
  • Print ISBN 978-1-4614-1459-9
  • Online ISBN 978-1-4614-1460-5
  • Series Print ISSN 2191-5768
  • Series Online ISSN 2191-5776
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Energy, Utilities & Environment
Aerospace
Oil, Gas & Geosciences
Engineering