1 / 8

USC CSci599 Trusted Computing - Lecture Fourteen Current Topics 20 April 2007

USC CSci599 Trusted Computing - Lecture Fourteen Current Topics 20 April 2007. Dr. Clifford Neuman University of Southern California Information Sciences Institute. Announcements. Additional lecture audio posted (thanks Rob Huber) Next week is final lecture Projects due

pulaski
Download Presentation

USC CSci599 Trusted Computing - Lecture Fourteen Current Topics 20 April 2007

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. USC CSci599Trusted Computing - Lecture FourteenCurrent Topics20 April 2007 Dr. Clifford Neuman University of Southern California Information Sciences Institute

  2. Announcements • Additional lecture audio posted • (thanks Rob Huber) • Next week is final lecture • Projects due • Class Evaluation Next Week

  3. Presentations • Diana Kirtley • Vijay Gopala Krishnan (possibly)

  4. TC and Distributed Firewalls • Product space for firewalls • Traditional firewalls • Host based firewalls • Embedded firewalls • Distributed firewalls • Benefits of each • Limitations of each • How can trusted computing help • What about TVSA

  5. TC and Reputation Based Systems • How TC can help • Limit number of identities • Manage reputation directly • Protect credentials use by participants • What about reputation used for TC • How we determine which programs are trusted.

  6. TC and Performance • Costs of trusted computing lie in: • Measurement during load • Crypto for attestation “Quote” • Managing “what” is allowed • Overhead of virtualization • Human costs of separation

  7. TC and Mobile Devices • Using mobile devices as “trusted path” to user • Attestation enables trusted device to verify integrity of the device that is requesting path to user. • Some of these ideas are being explored by Adrian Perrig at CMU • (work some examples)

  8. TC and Forensics • Chain of custody is important for forensics • A TPM that signs and dates something in such a way that it can not be later modified – even by the person possessing it, can replace traditional chain of custody. • Must argue that the TPM can not be compromised. • A way of linking series of attestations can help.

More Related