首页> 外文会议>International Conference on Information and Communications Security(ICICS 2005); 20051210-13; Beijing(CN) >Remotely Keyed Cryptographies Secure Remote Display Access Using (Mostly) Untrusted Hardware
【24h】

Remotely Keyed Cryptographies Secure Remote Display Access Using (Mostly) Untrusted Hardware

机译:远程加密密钥使用(大多数)不受信任的硬件来保护远程显示访问

获取原文
获取原文并翻译 | 示例

摘要

Software that covertly monitors user actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and removing it. Such software may be inadvertently installed by a user that is casually browsing the web, or may be purposely installed by an attacker or even the owner of a system. This is particularly problematic in the case of utility computing, early manifestations of which are Internet cafes and thin-client computing. Traditional trusted computing approaches offer a partial solution to this by significantly increasing the size of the trusted computing base (TCB) to include the operating system and other software. We examine the problem of protecting a user accessing specific services in such an environment. We focus on secure video broadcasts and remote desktop access when using any convenient, and often untrusted, terminal as two example applications. We posit that, at least for such applications, the TCB can be confined to a suitably modified graphics processing unit (GPU). Specifically, to prevent spyware on untrusted clients from accessing the user's data, we restrict the boundary of trust to the client's GPU by moving image decryption into GPUs. This allows us to leverage existing capabilities as opposed to designing a new component from scratch. We discuss the applicability of GPU-based decryption in the two scenarios. We identify limitations due to current GPU capabilities and propose straightforward modifications to GPUs that will allow the realization of our approach.
机译:秘密监视用户操作的软件(也称为间谍软件)由于无处不在以及检测和删除它的困难而已成为第一级安全威胁。此类软件可能是由随意浏览Web的用户无意中安装的,或者可能是攻击者甚至系统所有者有意安装的。在实用程序计算的情况下,这尤其成问题,实用程序的早期表现是网吧和瘦客户端计算。传统的可信计算方法通过显着增加可信计算库(TCB)的大小以包含操作系统和其他软件,从而提供了部分解决方案。我们研究了在这种环境下保护用户访问特定服务的问题。当使用任何方便且通常不可信的终端作为两个示例应用程序时,我们将重点放在安全的视频广播和远程桌面访问上。我们假定,至少对于这样的应用,TCB可以被限制在适当修改的图形处理单元(GPU)中。具体来说,为了防止不受信任的客户端上的间谍软件访问用户的数据,我们通过将图像解密移动到GPU中来将信任的边界限制在客户端的GPU上。这使我们可以利用现有功能,而不是从头开始设计新组件。我们讨论了在两种情况下基于GPU的解密的适用性。我们确定了当前GPU功能所带来的局限性,并提出了对GPU的直接修改,以实现我们的方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号