Building Technologies that Help Cyber-Defense: Hardware-enabled Trust

The paper discusses evolution of civil disobedience in cyberspace and real world. The result of comparison of both brings author to the conclusion of high impact of the deteriorating economic situation on the civil disobedience in both, cyberspace and real world, supporting each other. There is expectation of professionalization of movements in cyberspace slowly changing nature of attack to cyberterrorist-like attacks. The effort to bound free flow of information, governments will attempt to limit or circumscribe cyberspace in particular with reference to the fight against terrorism, which could lead to more aggressive civil disobedience in cyberspace.

[1]  Marcin Wójcik,et al.  Evaluation of a PUF Device Authentication Scheme on a Discrete 0.13um SRAM , 2011, INTRUST.

[2]  Ruby B. Lee,et al.  New cache designs for thwarting software cache-based side channel attacks , 2007, ISCA '07.

[3]  G. Edward Suh,et al.  Orthrus: efficient software integrity protection on multi-cores , 2010, ASPLOS 2010.

[4]  Valeria Bertacco,et al.  Engineering Trust with Semantic Guardians , 2007, 2007 Design, Automation & Test in Europe Conference & Exhibition.

[5]  Ruby B. Lee,et al.  Hardware-rooted trust for secure key management and transient trust , 2007, CCS '07.

[6]  Richard McClatchey,et al.  A Scalable Evidence Based Self-Managing Framework for Trust Management , 2007, Electron. Notes Theor. Comput. Sci..

[7]  Gaurav Shah,et al.  Keyboards and Covert Channels , 2006, USENIX Security Symposium.

[8]  Ruby B. Lee,et al.  Covert and Side Channels Due to Processor Architecture , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).

[9]  Tilman Wolf,et al.  Reconfigurable Hardware for High-Security/ High-Performance Embedded Systems: The SAFES Perspective , 2008, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[10]  Wei Hu,et al.  Theoretical analysis of gate level information flow tracking , 2010, Design Automation Conference.

[11]  Jiangtao Li,et al.  Consumerization: Consequences of Fuzzy Work-Home Boundaries , 2012 .

[12]  Jiangtao Li,et al.  A Practical Device Authentication Scheme Using SRAM PUFs , 2011, TRUST.

[13]  Robert H. Deng,et al.  Remote attestation on program execution , 2008, STC '08.

[14]  Ruby B. Lee,et al.  A novel cache architecture with enhanced performance and security , 2008, 2008 41st IEEE/ACM International Symposium on Microarchitecture.

[15]  Jean-Pierre Seifert,et al.  Software mitigations to hedge AES against cache-based software side channel vulnerabilities , 2006, IACR Cryptol. ePrint Arch..

[16]  Joseph Bonneau,et al.  Cache-Collision Timing Attacks Against AES , 2006, CHES.

[17]  Timothy Casey,et al.  Threat agents: a necessary component of threat analysis , 2010, CSIIRW '10.

[18]  Tomas Olovsson,et al.  Passive internet measurement: Overview and guidelines based on experiences , 2010, Comput. Commun..

[19]  Frederick T. Sheldon,et al.  Moving Toward Trustworthy Systems: R&D Essentials , 2010, Computer.

[20]  Zhendong Su,et al.  Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacks , 2008, NOMS 2008 - 2008 IEEE Network Operations and Management Symposium.

[21]  Frederic T. Chong,et al.  Gate-Level Information-Flow Tracking for Secure Architectures , 2010, IEEE Micro.

[22]  Stephen Barrett,et al.  Presumptive selection of trust evidence , 2007, AAMAS '07.

[23]  Ruby B. Lee,et al.  Architecture for Protecting Critical Secrets in Microprocessors , 2005, ISCA 2005.