Skip to main content
Top

2014 | OriginalPaper | Chapter

Dancing with the Adversary: A Tale of Wimps and Giants (Transcript of Discussion)

Author : Virgil Gligor

Published in: Security Protocols XXII

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The work reported here is based on some research that I have done with my students Min Suk Kang, Miao Yu, Jun Zhao, and Zongwei Zhou.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
Zongwei Zhou, Miao Yu, and Virgil Gligor. Dancing with Giants: Wimpy Kernels for On-demand Isolated I/O. In Proceedings of the IEEE Symposium on Security and Privacy, May 2014.
 
2
Hao Chen, Drew Dean and David Wagner. Model Checking One Million Lines of C Code. In Proceedings of the 11th USENIX Security Symposium, pages 171–185, San Diego, CA, February 2002.
 
3
Virgil Gligor. Security Limitations of Virtualization and How to Overcome Them. In Proceedings of the 18th International Workshop on Security Protocols (SPW-18), Cambridge, UK, March 2010, LNCS vol. 7061, Springer Verlag.
 
4
Jonathan McCune, Yanlin Li, Ning Qu, Zongwei Zhou, Anupam Datta, Virgil Gligor, and Aadrian Perrig. TrustVisor: Efficient TCB Reduction and Attestation. Technical Report, CMU-CyLab-09-003, March, 2009. (also In Proceedings of the IEEE Symp. on Security and Privacy, Oakland, CA, May 2010.)
 
5
Amit Vasudevan, Sagar Chaki, Limin Jia, Limin Jonathan McCune, James Newsome, and Anupam Datta. Design, Implementation and Verification of an eXtensible and Modular Hypervisor Framework. In Proceedings of the IEEE Symposium on Security and Privacy, 2013.
 
6
Virgil D. Gligor and Bruce G. Lindsay. Object Migration and Authentication. In IEEE Transactions on Software Engineering, SE-5, No. 6, 1979, pp. 607–611.
 
7
Virgil Gligor and Jeannette Wing. Towards a Theory of Trust in Networks of Humans and Computers. In Proceedings of the 19th International Workshop on Security Protocols (SPW-19), Cambridge, UK, March 2011. LNCS 7114, Springer Verlag.
 
8
Tiffany Hyun-Jin Kim, Virgil Gligor, and Adrian Perrig. Street-Level Trust Semantics for Attribute Authentication. In Proceedings of the 20th International Workshop on Security Protocols (SPW-20), Cambridge, UK, April 2012, LNCS 7622, Springer Verlag.
 
9
Sarbari Gupta and Virgil D. Gligor. Experience with a Penetration Analysis Method and Tool. In Proceedings of the 1992 National Computer Security Conference, Baltimore, Maryland, pp. 165 - 183.
 
10
J.D. Weiss. A System Security Engineering Process. In Proceedings of the 14th National Computer Security Conference, Baltimore, Maryland, 1991.
 
11
Edward G. Amoroso. Fundamentals of Computer Security Technology. Prentice-Hall, 1994, pp, 15–29, ISBN0131089293.
 
12
Bruce Schneier. Attack Trees. In Dr. Dobb’s Journal, v. 24, n. 12, December 1999, pp. 21–29.
 
13
Sjouke Mauw and Martijn Oosdijk. Foundations of Attack Trees. D. Won and S. Kim (Eds.), Proc. of the ICISC 2005, LNCS 3935, Springer Verlag, pp. 186–198.
 
14
Eric M. Hutchins, Michael J. Clopper, and Rohan M. Amin. Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains. In Proceedings of the 6th Annual International Conference on Information Warfare and Security, Washington, DC, 2011.
 
15
Jerome H. Saltzer and Michael D. Schroeder. The protection of information in computer systems. In Proceedings of the IEEE, Vol. 63, No. 9, pp. 1278–1308, September 1975.
 
16
Rosarion Gennaro, Craig Gentry, and Bryan Parno. Non-Interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers. In Proceedings of CRYPTO 2010, Springer Verlag, August 2010.
 
17
Zongwei Zhou, Jun Han, Yue-Hsun Lin, Adrian Perrig, and Virgil Gligor. KISS: “Key it Simple and Secure” Corporate Key Management. In Proceedings of the 5th International Conference on Trust and Trustworthy Computing (TRUST), London. 2013.
 
18
Virgil D. Gligor, Bryan Parno, Ji Sun Shin. Network Adversary Attacks against Secure Encryption Schemes. Technical Report CMU-CyLab-10-001, January, 2010.
 
19
Sanjit Chatterjee, Alfred Menezes, and Palash Sarkar. Another look at Tightness. In IACR Cryptology ePrint Archive 2011: 442 (2011).
 
20
Philip Rogaway. On the Role of Definitions in and Beyond Cryptography. In Proceedings of ASIAN, pages 13–32, 2004.
 
Metadata
Title
Dancing with the Adversary: A Tale of Wimps and Giants (Transcript of Discussion)
Author
Virgil Gligor
Copyright Year
2014
DOI
https://doi.org/10.1007/978-3-319-12400-1_12

Premium Partner