Secure applications on an untrusted operating system

Discussion in 'other security issues & news' started by MrBrian, Nov 5, 2014.

  1. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    From InkTag: Secure Applications on an Untrusted Operating System:
    See section 9 for related work.

    InkTag is also covered in dissertation "Rethinking Operating System Trust" (hxxp://repositories.lib.utexas.edu/bitstream/handle/2152/23318/HOFMANN-DISSERTATION-2013.pdf).
     
  2. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
  3. deBoetie

    deBoetie Registered Member

    Joined:
    Aug 7, 2013
    Posts:
    1,832
    Location:
    UK
    Thanks, will attempt to get my head round this.

    Surprised they didn't reference Qubes, although that is, in a sense, running services in an untrusted OS to an extent. But seems to be doing similar things really.

    Did you see how this handled stuff like keyboard, USB and the Gui?
     
  4. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    You're welcome :).

    No, but then again I didn't read the paper. Too bad that so much of the software discussed in academic security papers isn't available to the public.
     
  5. deBoetie

    deBoetie Registered Member

    Joined:
    Aug 7, 2013
    Posts:
    1,832
    Location:
    UK
    a) Pressure/manipulation never to release from the spooks
    b) University obsession with IP and patent (even when never exploited)
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.