Content-type: text/html Downes.ca ~ Stephen's Web ~ Establishing software root of trust unconditionally

Stephen Downes

Knowledge, Learning, Community

A 'root of trust' "ensures that a system state comprises all and only content chosen by the user, and the user's code begins execution in that state." In other words, only if you have a root of trust can you be sure nobody else has infiltrated your computer with spyware or whatever. This paper (Establishing software root of trust unconditionally Gligor & Woo, NDSS'19) demonstrates a proof for root of trust. The proof is complex, but is essentially based on the minimum time it would take for a computer to perform the 'lower bounds' of a specific algorithm (specifically, a hashing function).

Today: 2 Total: 1096 [Direct link] [Share]


Stephen Downes Stephen Downes, Casselman, Canada
stephen@downes.ca

Copyright 2024
Last Updated: Apr 18, 2024 7:27 p.m.

Canadian Flag Creative Commons License.

Force:yes