DocumentCode :
1239104
Title :
Remote booting in a hostile world: to whom am I speaking? [Computer security]
Author :
Lomas, Mark ; Christianson, Bruce
Author_Institution :
Comput. Lab., Cambridge Univ., UK
Volume :
28
Issue :
1
fYear :
1995
Firstpage :
50
Lastpage :
54
Abstract :
Today´s networked computer systems are very vulnerable to attack: terminal software, like that used by the X Window System, is frequently passed across a network, and a trojan horse can easily be inserted while it is in transit. Many other software products, including operating systems, load parts of themselves from a server across a network. Although users may be confident that their workstation is physically secure, some part of the network to which they are attached almost certainly is not secure. Most proposals that recommend cryptographic means to protect remotely loaded software also eliminate the advantages of remote loading-for example, ease of reconfiguration, upgrade distribution, and maintenance. For this reason, they have largely been abandoned before finding their way into commercial products. The article shows that, contrary to intuition, it is no more difficult to protect a workstation that loads its software across an insecure network than to protect a stand-alone workstation. In contrast to prevailing practice, the authors make essential use of a collision-rich hash function to ensure that an exhaustive off-line search by the opponent will produce not one, but many candidate pass words. This strategy forces the opponent into an open, on-line guessing attack and offers the user a defensive strategy unavailable in the case of an off-line attack.<>
Keywords :
cryptography; operating systems (computers); wide area networks; workstations; X Window System; attack; collision-rich hash function; cryptographic means; exhaustive off-line search; insecure network; maintenance; networked computer systems; operating systems; reconfiguration; remote booting; remote loading; remotely loaded software; security; software products; stand-alone workstation; terminal software; trojan horse; upgrade distribution; users; workstation; workstation protection; Computer networks; Computer security; Cryptography; Invasive software; Network servers; Operating systems; Proposals; Protection; Software maintenance; Workstations;
fLanguage :
English
Journal_Title :
Computer
Publisher :
ieee
ISSN :
0018-9162
Type :
jour
DOI :
10.1109/2.362630
Filename :
362630
Link To Document :
بازگشت