Idiosyncratic Signatures for Authenticated Execution of Management Code

  • Mario Baldi
  • Yoram Ofek
  • Moti Yung
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2867)


TrustedFlowTM is a software solution to the problem of remotely authenticating code during execution. A continuous flow of idiosyncratic signatures assures that the software from which they have emanated is not changed prior to and during execution. TrustedFlowTM can be used to create a run-time trust relationship between the components of a distributed management system.


Management Agent Network Management Software Solution Malicious Code Management Code 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Baldi, M., Ofek, Y., Yung, M.: Idiosyncratic Signatures for Authenticated Execution - The TrustedFlowTMTM. Protocol and its Application to TCP. In: IASTED CSN 2003, Benalmadena, Spain (2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Mario Baldi
    • 1
  • Yoram Ofek
    • 2
  • Moti Yung
    • 3
  1. 1.Computer Engineering Department TorinoTorino PolytechnicItaly
  2. 2.Synchrodyne Networks, Inc.New York
  3. 3.Computer Science DepartmentColumbia UniversityNew York

Personalised recommendations