Abstract
Suppose you are presented with two physically identical computers. One is running a highly-certified, formally-proven, time-tested software stack, while the other is running a commodity software stack that provides similar features, but is infested with sophisticated malware. How can you tell which computer is which? How can you decide which computer you should use to check your email, update your medical records, or access your bank account?
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2011 The Author(s)
About this chapter
Cite this chapter
Parno, B., McCune, J.M., Perrig, A. (2011). Introduction. In: Bootstrapping Trust in Modern Computers. SpringerBriefs in Computer Science, vol 10. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-1460-5_1
Download citation
DOI: https://doi.org/10.1007/978-1-4614-1460-5_1
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-1459-9
Online ISBN: 978-1-4614-1460-5
eBook Packages: Computer ScienceComputer Science (R0)