THIS IS THE ARCHIVED SSRC SITE.
Maintained by Ethan L. Miller.
The current CRSS site is at https://www.crss.us/.

Exploring Trusted Networking for Protected Applications

Published as Working-group on Applied Security & Privacy Technical Report UCSC-WASP-12-01.

Abstract

In modern computing systems, networking is critical. In the context of trusted application environments, building a trusted networking interface remains an open question. In this paper, we categorize the networking needs of trusted applications into three modes: Local Equivalent, Trusted Local Networks and Internet-Wide Trusted Networking. Collectively these modes enable trusted applications to do everything from securely accessing the network to establishing a valid identity on the local network, or even the Internet. We explore the hardware mechanisms available in currently shipping products which can be used to implement our interfaces. We discuss our plans to prototype these networking interfaces in our lab's trusted platform called LockBox. We conclude that our trusted networking design is feasible using existing hardware and is ready for implementation.

Publication date:
June 2012

Authors:
D J Capelis
James Larkby-Lahet
Darrell D. E. Long

Projects:
User Controlled Trusted Systems

Available media

Full paper text: PDF

Bibtex entry

@techreport{wasptr-12-01,
  author       = {D J Capelis and James Larkby-Lahet and Darrell D. E. Long},
  title        = {Exploring Trusted Networking for Protected Applications},
  institution  = {University of California, Santa Cruz},
  number       = {UCSC-WASP-12-01},
  month        = jun,
  year         = {2012},
}
Last modified 24 May 2019