Title :
The TrustedFlow™ protocol - idiosyncratic signatures for authenticated execution
Author :
Baldi, Mario ; Ofek, Yoram ; Yung, Moti
Author_Institution :
Comput. Eng. Dept., Torino Polytech., Italy
Abstract :
We present a software solution to the problem of remotely authenticating software during execution, which aims at assuring that the software is not changed prior to and during execution. The solution is based on a flow of idiosyncratic signatures that is generated by a function hidden in the software to be authenticated and validated by a remote computing component. The TrustedFlow™ approach is complementary to many current enhancements for secure computing and networking: while other approaches provide privacy and authentication protecting from the attacks of a man in the middle, TrustedFlow™ protects from the attack of a man at the edge.
Keywords :
computer crime; cryptography; data privacy; message authentication; protocols; TrustedFlow protocol; idiosyncratic signature; network security; remote computing component; software authentication; software validation; trusted code execution; trusted computing; Application software; Authentication; Collaborative software; Computer network management; Computer networks; Network servers; Privacy; Protection; Protocols; Runtime;
Conference_Titel :
Information Assurance Workshop, 2003. IEEE Systems, Man and Cybernetics Society
Print_ISBN :
0-7803-7808-3
DOI :
10.1109/SMCSIA.2003.1232435