首页> 外文OA文献 >Remotely Keyed Cryptographics: Secure Remote Display Access Using (Mostly) Untrusted Hardware
【2h】

Remotely Keyed Cryptographics: Secure Remote Display Access Using (Mostly) Untrusted Hardware

机译:远程密钥加密:使用(大多数)不受信任的硬件进行安全的远程显示访问

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Software that covertly monitors user actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and removing it. Such software may be inadvertently installed by a user that is casually browsing the web, or may be purposely installed by an attacker or even the owner of a system. This is particularly problematic in the case of utility computing, early manifestations of which are Internet cafes and thin-client computing. Traditional trusted computing approaches offer a partial solution to this by significantly increasing the size of the trusted computing base (TCB) to include the operating system and other software. We examine the problem of protecting a user accessing specific services in such an environment. We focus on secure video broadcasts and remote desktop access when using any convenient, and often untrusted, terminal as two example applications. We posit that, at least for such applications, the TCB can be confined to a suitably modified graphics processing unit (GPU). Specifically, to prevent spyware on untrusted clients from accessing the user's data, we restrict the boundary of trust to the client's GPU by moving image decryption into GPUs. This allows us to leverage existing capabilities as opposed to designing a new component from scratch. We discuss the applicability of GPU-based decryption in the two scenarios. We identify limitations due to current GPU capabilities and propose straightforward modifications to GPUs that will allow the realization of our approach.
机译:秘密监视用户操作的软件(也称为间谍软件)由于无处不在以及检测和删除它的困难而已成为第一级安全威胁。此类软件可能是由随意浏览Web的用户无意中安装的,或者可能是攻击者甚至系统所有者有意安装的。在实用程序计算的情况下,这尤其成问题,实用程序的早期表现是网吧和瘦客户端计算。传统的可信计算方法通过显着增加可信计算库(TCB)的大小以包含操作系统和其他软件,从而提供了部分解决方案。我们研究了在这种环境下保护用户访问特定服务的问题。当使用任何方便且通常不可信的终端作为两个示例应用程序时,我们将重点放在安全的视频广播和远程桌面访问上。我们假定,至少对于这样的应用,TCB可以被限制在适当修改的图形处理单元(GPU)中。具体来说,为了防止不受信任的客户端上的间谍软件访问用户的数据,我们通过将图像解密移动到GPU中来将信任的边界限制在客户端的GPU上。这使我们可以利用现有功能,而不是从头开始设计新组件。我们讨论了在两种情况下基于GPU的解密的适用性。我们确定了当前GPU功能所带来的局限性,并提出了对GPU的直接修改,以实现我们的方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号