Title :
Spy: a method to secure clients for network services
Author :
Lipton, R.J. ; Rajagopalan, S. ; Serpanos, D.N.
Author_Institution :
Coll. of Comput., Georgia Inst. of Technol., Atlanta, GA, USA
Abstract :
A fundamental problem in security is guaranteeing correct program behavior on an untrusted computer regardless of a user\´s actions. The problem appears in digital rights management, secure boot, e-appliances, etc. All existing approaches are either partial or unreliable. Today, dependable security is necessary not only for e-commerce, but also to ensure that, under critical conditions of information warfare, remote clients behave predictably and securely, and cannot compromise the infrastructure. We prove that the problem of correct program execution is unsolvable without adoption of a trusted hardware platform. Since it is impractical to consider as trusted a complex computer system, we identify the minimal hardware support that enables a complete solution. We propose two simple hardware mechanisms which require minimal change to the currently popular PC architecture: (i) the use of a trusted "sealed" computing device, the "spy", and (ii) a hardware interrupt, called "two minute warning", which has the highest priority and has a pre-defined time difference from any subsequent interrupt. Finally, we incrementally build upon this minimal hardware support larger and more complex applications with guaranteed security. We call this construction the inverse security pyramid.
Keywords :
client-server systems; computer networks; security of data; PC architecture; client security; dependable security; e-commerce; guaranteed correct program behavior; hardware interrupt; information warfare; inverse security pyramid; network services; remote clients; spy; trusted hardware platform; trusted sealed computing device; two minute warning; untrusted computer; Application software; Computer industry; Computer security; Content management; Hardware; Information security; Intellectual property; Military computing; Propagation losses; Protection;
Conference_Titel :
Distributed Computing Systems Workshops, 2002. Proceedings. 22nd International Conference on
Print_ISBN :
0-7695-1588-6
DOI :
10.1109/ICDCSW.2002.1030743