enter search term and/or author name
SpartanRPC: Remote Procedure Call Authorization in Wireless Sensor Networks
Peter Chapin, Christian Skalka
Article No.: 5
We describe SpartanRPC, a secure middleware technology that supports cooperation between distinct security domains in wireless sensor networks. SpartanRPC extends nesC to provide a link-layer remote procedure call (RPC) mechanism, along with an...
Mutual Authentication and Trust Bootstrapping towards Secure Disk Encryption
Johannes Götzfried, Tilo Müller
Article No.: 6
The weakest link in software-based full disk encryption is the authentication procedure. Since the master boot record must be present unencrypted in order to launch the decryption of remaining system parts, it can easily be manipulated and...
Know Your Enemy: Compromising Adversaries in Protocol Analysis
David Basin, Cas Cremers
Article No.: 7
We present a symbolic framework, based on a modular operational semantics, for formalizing different notions of compromise relevant for the design and analysis of cryptographic protocols. The framework’s rules can be combined to specify...
StopWatch: A Cloud Architecture for Timing Channel Mitigation
Peng Li, Debin Gao, Michael K. Reiter
Article No.: 8
This article presents StopWatch, a system that defends against timing-based side-channel attacks that arise from coresidency of victims and attackers in infrastructure-as-a-service clouds. StopWatch triplicates each cloud-resident guest virtual...