The DBAMP Project Hosted on sourceforge (http://sourceforge.net/projects/sergdbamp/) contains all the deliverables (also linked from the Milestone chart), Follow the Following steps to Run each of them on your Mobile (Neo FreeRunner).
1. Milestone 6 contains openmoko rootfs along with all the required...
This is part 1 in a series of 3 short essays to introduce the reader to the principles of isolation in distributed information systems.
Any typical information system is by nature a distributed application/system. Therefore we have a client side, a server side and a means of communication. As an...
Earlier software tokens were considered weak against malicious activities because the chain of trust could not be established by putting trust on software available at the runtime of the token usage. These days software tokens have become more effective as the available hardware tokens, aka hardware...
Video Lectures related to the project Dynamic Behavioral Attestation for Mobile Platforms are now available. You can see the (constantly updated) list of uploaded video lectures here.
We have successfully built NSA SELinux for OpenMoko FreeRunner with support for policy 19-23 using kernel-2.6.24. Most of it was cross compilation and understanding of the kernel and userspace infrastructure of SELinux.
The policy is now being developed further to suite our solutions in permissive mode....
The contribution by SERG has been accepted for the technical strand of the International Conference on Technical and Socio-economic Aspects of Trusted Computing (Trust 2009). So, SERG will probably be represented by one of its members at the conference. More on this later after the registration process...
[These are comments to the paper titled, "From Trusted to Secure: Building and Executing Applications That Enforce System Security" available at USENIX ATC'07.]
The paper deals with the issue of differences between security enforcement on the operating system level and within applications. It describes...
ARM Ltd. has teamed with Trusted Logic to develop secure software for mobile handsets and set-top boxes that will combine the microprocessor core maker’s TrustZone technology with optimized security software from Trusted Logic…..
Embedded.com – ARM links with Trusted Logic for secure...
After the comparison of trendy MAC enhancements, I have been figuring out the general needs of a network for MAC. We have three places where MAC can and is enforced:
In Application: Where flow control of application is controled by labeling the data of the application. Current research is limited to...
coondoggie writes us with a link to the Network World site, as he tends to do. Today he offers an article discussing the cancellation of a presentation which would have undermined chip-based security on PCs. Scheduled during the Black Hat USA 2007 event, the event’s briefing promised to break...