Publication | Closed Access
Establishing the genuinity of remote computer systems
182
Citations
22
References
2003
Year
Remote OperationEngineeringRemote DiagnosticsInformation SecurityVerificationFormal VerificationCritical ComputingHardware SecurityFundamental ProblemGenuinity TestSystems EngineeringSecure ComputingTrusted Operating SystemNetwork SecurityData PrivacyRemote Computer SystemsComputer ScienceData SecurityCryptographyTrustworthy ComputingTrusted SystemRemote Computer SystemSystem Software
A fundamental problem in distributed computing environments involves determining whether a remote computer system can be trusted to autonomously access secure resources via a network. The paper proposes a method to challenge a remote computer system to prove its genuinity and trustworthiness. The method tests consumer‑grade systems with a standard network interface, requires no additional hardware, transmits results over unsecured links, and grants resource access upon passing while maintaining contact with a certifying authority. The authors show that potential attacks can be avoided and present a functional implementation of the genuinity test for representative computer systems.
A fundamental problem in distributed computing environments involves determining whether a remote computer system can be trusted to autonomously access secure resources via a network. In this paper, we describe a means by which a remote computer system can be challenged to demonstrate that it is genuine and trustworthy. Upon passing a test, it can be granted access to distributed resources and can serve as a general-purpose host for distributed computation so long as it remains in contact with some certifying authority. The test we describe is applicable to consumer-grade computer systems with a conventional network interface and requires no additional hardware. The results of the test can be conveyed over an unsecured network; no trusted human intermediary is needed to relay the results. We examine potential attacks and weaknesses of the system and show how they can be avoided. Finally, we describe an implementation of a genuinity test for a representative set of computer systems.
| Year | Citations | |
|---|---|---|
Page 1
Page 1