Exploring Trusted Networking for Protected Applications
Published as Working-group on Applied Security & Privacy Technical Report UCSC-WASP-12-01.
Abstract
In modern computing systems, networking is critical. In the context of trusted application environments, building a trusted networking interface remains an open question. In this paper, we categorize the networking needs of trusted applications into three modes: Local Equivalent, Trusted Local Networks and Internet-Wide Trusted Networking. Collectively these modes enable trusted applications to do everything from securely accessing the network to establishing a valid identity on the local network, or even the Internet. We explore the hardware mechanisms available in currently shipping products which can be used to implement our interfaces. We discuss our plans to prototype these networking interfaces in our lab's trusted platform called LockBox. We conclude that our trusted networking design is feasible using existing hardware and is ready for implementation.
Publication date:
June 2012
Authors:
D J Capelis
James Larkby-Lahet
Darrell D. E. Long
Projects:
User Controlled Trusted Systems
Available media
Full paper text: PDF
Bibtex entry
@techreport{wasptr-12-01, author = {D J Capelis and James Larkby-Lahet and Darrell D. E. Long}, title = {Exploring Trusted Networking for Protected Applications}, institution = {University of California, Santa Cruz}, number = {UCSC-WASP-12-01}, month = jun, year = {2012}, }