Archive by category 'Trusted Computing'
 
DBAMP Readme
June 24th, 2011 By Waqar Afridi

The DBAMP Project Hosted on sourceforge (http://sourceforge.net/projects/sergdbamp/) contains all the deliverables (also linked from the Milestone chart), Follow the Following steps to Run each of them on your Mobile (Neo FreeRunner). 1. Milestone 6 contains openmoko rootfs along with all the required...

Read All
Principles of Isolation – Part 1
October 19th, 2010 By shazkhan

This is part 1 in a series of 3 short essays to introduce the reader to the principles of isolation in distributed information systems. Any typical information system is by nature a distributed application/system. Therefore we have a client side, a server side and a means of communication. As an...

Read All

Earlier software tokens were considered weak against malicious activities because the chain of trust could not be established by putting trust on software available at the runtime of the token usage. These days software tokens have become more effective as the available hardware tokens, aka hardware...

Read All
Video Lectures Available
May 18th, 2009 By recluze

Video Lectures related to the project Dynamic Behavioral Attestation for Mobile Platforms are now available. You can see the (constantly updated) list of uploaded video lectures here.

Read All
SELinux on FreeRunner
April 27th, 2009 By shazkhan

We have successfully built NSA SELinux for OpenMoko FreeRunner with support for policy 19-23 using kernel-2.6.24. Most of it was cross compilation and understanding of the kernel and userspace infrastructure of SELinux. The policy is now being developed further to suite our solutions in permissive mode....

Read All
Trust 2009 Paper
January 8th, 2009 By recluze

The contribution by SERG has been accepted for the technical strand of the International Conference on Technical and Socio-economic Aspects of Trusted Computing (Trust 2009). So, SERG will probably be represented by one of its members at the conference. More on this later after the registration process...

Read All

[These are comments to the paper titled, "From Trusted to Secure: Building and Executing Applications That Enforce System Security" available at USENIX ATC'07.] The paper deals with the issue of differences between security enforcement on the operating system level and within applications. It describes...

Read All

ARM Ltd. has teamed with Trusted Logic to develop secure software for mobile handsets and set-top boxes that will combine the microprocessor core maker’s TrustZone technology with optimized security software from Trusted Logic….. Embedded.com – ARM links with Trusted Logic for secure...

Read All
Needs of network for MAC
August 25th, 2007 By shazkhan

After the comparison of trendy MAC enhancements, I have been figuring out the general needs of a network for MAC. We have three places where MAC can and is enforced: In Application: Where flow control of application is controled by labeling the data of the application. Current research is limited to...

Read All

coondoggie writes us with a link to the Network World site, as he tends to do. Today he offers an article discussing the cancellation of a presentation which would have undermined chip-based security on PCs. Scheduled during the Black Hat USA 2007 event, the event’s briefing promised to break...

Read All