Protected Software Module Architectures View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2013

AUTHORS

Raoul Strackx , Job Noorman , Ingrid Verbauwhede , Bart Preneel , Frank Piessens

ABSTRACT

A significant fraction of Internet-connected computing devices is infected with malware. With the increased connectivity and software extensibility of embedded and industrial devices, this threat is now also relevant for our industrial infrastructure and our personal environments. Since many of these devices interact with remote parties for security-critical or privacy sensitive transactions, it is important to develop security architectures that allow a stakeholder to assess the trustworthiness of a computing device, and that allow such stakeholders to securely execute software on that device. Over the past decade, the security research community has proposed and evaluated such architectures. Important and promising examples are protected software module architectures. These architectures support the secure execution of small protected software modules even on devices that are malware infected. They also make it possible for remote parties to collect trust evidence about a device; the remote party can use the security architecture to collect measurements that give assurance that the device is in a trustworthy state.In this paper we outline the essential ideas behind this promising recent line of security research, and report on our experiences in developing several protected module architectures for different types of devices. More... »

PAGES

241-251

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-658-03371-2_21

DOI

http://dx.doi.org/10.1007/978-3-658-03371-2_21

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1049513757


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0803", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Computer Software", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0806", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information Systems", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "iMinds-DistriNet, KU Leuven, Celestijnenlaan 200A, 3001, Leuven, Belgium", 
          "id": "http://www.grid.ac/institutes/grid.5596.f", 
          "name": [
            "iMinds-DistriNet, KU Leuven, Celestijnenlaan 200A, 3001, Leuven, Belgium"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Strackx", 
        "givenName": "Raoul", 
        "id": "sg:person.014371015647.90", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014371015647.90"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "iMinds-DistriNet, KU Leuven, Celestijnenlaan 200A, 3001, Leuven, Belgium", 
          "id": "http://www.grid.ac/institutes/grid.5596.f", 
          "name": [
            "iMinds-DistriNet, KU Leuven, Celestijnenlaan 200A, 3001, Leuven, Belgium"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Noorman", 
        "givenName": "Job", 
        "id": "sg:person.012354071717.95", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012354071717.95"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "iMinds-COSIC, KU Leuven, Kasteelpark Arenberg 10, 3001, Leuven, Belgium", 
          "id": "http://www.grid.ac/institutes/grid.5596.f", 
          "name": [
            "iMinds-COSIC, KU Leuven, Kasteelpark Arenberg 10, 3001, Leuven, Belgium"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Verbauwhede", 
        "givenName": "Ingrid", 
        "id": "sg:person.014435152743.83", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014435152743.83"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "iMinds-COSIC, KU Leuven, Kasteelpark Arenberg 10, 3001, Leuven, Belgium", 
          "id": "http://www.grid.ac/institutes/grid.5596.f", 
          "name": [
            "iMinds-COSIC, KU Leuven, Kasteelpark Arenberg 10, 3001, Leuven, Belgium"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Preneel", 
        "givenName": "Bart", 
        "id": "sg:person.011115044357.39", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011115044357.39"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "iMinds-DistriNet, KU Leuven, Celestijnenlaan 200A, 3001, Leuven, Belgium", 
          "id": "http://www.grid.ac/institutes/grid.5596.f", 
          "name": [
            "iMinds-DistriNet, KU Leuven, Celestijnenlaan 200A, 3001, Leuven, Belgium"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Piessens", 
        "givenName": "Frank", 
        "id": "sg:person.014464203672.97", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014464203672.97"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2013", 
    "datePublishedReg": "2013-01-01", 
    "description": "A significant fraction of Internet-connected computing devices is infected with malware. With the increased connectivity and software extensibility of embedded and industrial devices, this threat is now also relevant for our industrial infrastructure and our personal environments. Since many of these devices interact with remote parties for security-critical or privacy sensitive transactions, it is important to develop security architectures that allow a stakeholder to assess the trustworthiness of a computing device, and that allow such stakeholders to securely execute software on that device. Over the past decade, the security research community has proposed and evaluated such architectures. Important and promising examples are protected software module architectures. These architectures support the secure execution of small protected software modules even on devices that are malware infected. They also make it possible for remote parties to collect trust evidence about a device; the remote party can use the security architecture to collect measurements that give assurance that the device is in a trustworthy state.In this paper we outline the essential ideas behind this promising recent line of security research, and report on our experiences in developing several protected module architectures for different types of devices.", 
    "editor": [
      {
        "familyName": "Reimer", 
        "givenName": "Helmut", 
        "type": "Person"
      }, 
      {
        "familyName": "Pohlmann", 
        "givenName": "Norbert", 
        "type": "Person"
      }, 
      {
        "familyName": "Schneider", 
        "givenName": "Wolfgang", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-658-03371-2_21", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-658-03370-5", 
        "978-3-658-03371-2"
      ], 
      "name": "ISSE 2013 Securing Electronic Business Processes", 
      "type": "Book"
    }, 
    "keywords": [
      "software modules", 
      "security architecture", 
      "remote parties", 
      "Internet-connected computing devices", 
      "security research community", 
      "module architecture", 
      "software extensibility", 
      "secure execution", 
      "trust evidence", 
      "sensitive transactions", 
      "computing devices", 
      "trustworthy state", 
      "security research", 
      "such architectures", 
      "architecture", 
      "research community", 
      "industrial devices", 
      "malware", 
      "personal environment", 
      "industrial infrastructure", 
      "devices", 
      "essential idea", 
      "module", 
      "such stakeholders", 
      "recent line", 
      "promising example", 
      "execution", 
      "software", 
      "extensibility", 
      "trustworthiness", 
      "infrastructure", 
      "transactions", 
      "parties", 
      "connectivity", 
      "different types", 
      "assurance", 
      "stakeholders", 
      "environment", 
      "past decade", 
      "idea", 
      "threat", 
      "example", 
      "research", 
      "significant fraction", 
      "experience", 
      "community", 
      "paper", 
      "state", 
      "measurements", 
      "decades", 
      "types", 
      "lines", 
      "fraction", 
      "evidence"
    ], 
    "name": "Protected Software Module Architectures", 
    "pagination": "241-251", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1049513757"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-658-03371-2_21"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-658-03371-2_21", 
      "https://app.dimensions.ai/details/publication/pub.1049513757"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-12-01T06:46", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20221201/entities/gbq_results/chapter/chapter_124.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-658-03371-2_21"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-658-03371-2_21'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-658-03371-2_21'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-658-03371-2_21'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-658-03371-2_21'


 

This table displays all metadata directly associated to this object as RDF triples.

161 TRIPLES      22 PREDICATES      81 URIs      72 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-658-03371-2_21 schema:about anzsrc-for:08
2 anzsrc-for:0803
3 anzsrc-for:0804
4 anzsrc-for:0806
5 schema:author Nea7faa1f35ea41a3980897e5b702c40a
6 schema:datePublished 2013
7 schema:datePublishedReg 2013-01-01
8 schema:description A significant fraction of Internet-connected computing devices is infected with malware. With the increased connectivity and software extensibility of embedded and industrial devices, this threat is now also relevant for our industrial infrastructure and our personal environments. Since many of these devices interact with remote parties for security-critical or privacy sensitive transactions, it is important to develop security architectures that allow a stakeholder to assess the trustworthiness of a computing device, and that allow such stakeholders to securely execute software on that device. Over the past decade, the security research community has proposed and evaluated such architectures. Important and promising examples are protected software module architectures. These architectures support the secure execution of small protected software modules even on devices that are malware infected. They also make it possible for remote parties to collect trust evidence about a device; the remote party can use the security architecture to collect measurements that give assurance that the device is in a trustworthy state.In this paper we outline the essential ideas behind this promising recent line of security research, and report on our experiences in developing several protected module architectures for different types of devices.
9 schema:editor Na58c376b8d6c4eb082dbc36c20e0ac77
10 schema:genre chapter
11 schema:isAccessibleForFree true
12 schema:isPartOf N198055cba1414411a13610186a548e68
13 schema:keywords Internet-connected computing devices
14 architecture
15 assurance
16 community
17 computing devices
18 connectivity
19 decades
20 devices
21 different types
22 environment
23 essential idea
24 evidence
25 example
26 execution
27 experience
28 extensibility
29 fraction
30 idea
31 industrial devices
32 industrial infrastructure
33 infrastructure
34 lines
35 malware
36 measurements
37 module
38 module architecture
39 paper
40 parties
41 past decade
42 personal environment
43 promising example
44 recent line
45 remote parties
46 research
47 research community
48 secure execution
49 security architecture
50 security research
51 security research community
52 sensitive transactions
53 significant fraction
54 software
55 software extensibility
56 software modules
57 stakeholders
58 state
59 such architectures
60 such stakeholders
61 threat
62 transactions
63 trust evidence
64 trustworthiness
65 trustworthy state
66 types
67 schema:name Protected Software Module Architectures
68 schema:pagination 241-251
69 schema:productId N2244123fd92a4a01b3ba58b495d110f7
70 Ncafafe905a244fbb82290011dab4ba39
71 schema:publisher N7906abb7d7724d449948ae2d1b0aa741
72 schema:sameAs https://app.dimensions.ai/details/publication/pub.1049513757
73 https://doi.org/10.1007/978-3-658-03371-2_21
74 schema:sdDatePublished 2022-12-01T06:46
75 schema:sdLicense https://scigraph.springernature.com/explorer/license/
76 schema:sdPublisher Nc30847d9ca73482a8cd2b9c5ac8c4af6
77 schema:url https://doi.org/10.1007/978-3-658-03371-2_21
78 sgo:license sg:explorer/license/
79 sgo:sdDataset chapters
80 rdf:type schema:Chapter
81 N11c2426cd7814d62bd8e95cca87b5108 rdf:first sg:person.012354071717.95
82 rdf:rest N3c93c844fdae4a0bac2c4beab9cc035c
83 N15c51f695bec4562961b434f9dd8382a rdf:first N701e4551f75d45f8a9a1f25fcec794a3
84 rdf:rest N8becd3ccaf6340bf9d1863b5a31a095d
85 N198055cba1414411a13610186a548e68 schema:isbn 978-3-658-03370-5
86 978-3-658-03371-2
87 schema:name ISSE 2013 Securing Electronic Business Processes
88 rdf:type schema:Book
89 N2244123fd92a4a01b3ba58b495d110f7 schema:name doi
90 schema:value 10.1007/978-3-658-03371-2_21
91 rdf:type schema:PropertyValue
92 N3c93c844fdae4a0bac2c4beab9cc035c rdf:first sg:person.014435152743.83
93 rdf:rest Nca700c648fab48d2b8535aef894fc067
94 N701e4551f75d45f8a9a1f25fcec794a3 schema:familyName Pohlmann
95 schema:givenName Norbert
96 rdf:type schema:Person
97 N7906abb7d7724d449948ae2d1b0aa741 schema:name Springer Nature
98 rdf:type schema:Organisation
99 N8becd3ccaf6340bf9d1863b5a31a095d rdf:first Ne06088b07623480b9a3201b5b3d43abe
100 rdf:rest rdf:nil
101 Na58c376b8d6c4eb082dbc36c20e0ac77 rdf:first Nefb2e57692654003848f362bbf4628ea
102 rdf:rest N15c51f695bec4562961b434f9dd8382a
103 Nc30847d9ca73482a8cd2b9c5ac8c4af6 schema:name Springer Nature - SN SciGraph project
104 rdf:type schema:Organization
105 Nca700c648fab48d2b8535aef894fc067 rdf:first sg:person.011115044357.39
106 rdf:rest Nd9352f308f8d40b99ca1cf8c42d715af
107 Ncafafe905a244fbb82290011dab4ba39 schema:name dimensions_id
108 schema:value pub.1049513757
109 rdf:type schema:PropertyValue
110 Nd9352f308f8d40b99ca1cf8c42d715af rdf:first sg:person.014464203672.97
111 rdf:rest rdf:nil
112 Ne06088b07623480b9a3201b5b3d43abe schema:familyName Schneider
113 schema:givenName Wolfgang
114 rdf:type schema:Person
115 Nea7faa1f35ea41a3980897e5b702c40a rdf:first sg:person.014371015647.90
116 rdf:rest N11c2426cd7814d62bd8e95cca87b5108
117 Nefb2e57692654003848f362bbf4628ea schema:familyName Reimer
118 schema:givenName Helmut
119 rdf:type schema:Person
120 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
121 schema:name Information and Computing Sciences
122 rdf:type schema:DefinedTerm
123 anzsrc-for:0803 schema:inDefinedTermSet anzsrc-for:
124 schema:name Computer Software
125 rdf:type schema:DefinedTerm
126 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
127 schema:name Data Format
128 rdf:type schema:DefinedTerm
129 anzsrc-for:0806 schema:inDefinedTermSet anzsrc-for:
130 schema:name Information Systems
131 rdf:type schema:DefinedTerm
132 sg:person.011115044357.39 schema:affiliation grid-institutes:grid.5596.f
133 schema:familyName Preneel
134 schema:givenName Bart
135 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011115044357.39
136 rdf:type schema:Person
137 sg:person.012354071717.95 schema:affiliation grid-institutes:grid.5596.f
138 schema:familyName Noorman
139 schema:givenName Job
140 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012354071717.95
141 rdf:type schema:Person
142 sg:person.014371015647.90 schema:affiliation grid-institutes:grid.5596.f
143 schema:familyName Strackx
144 schema:givenName Raoul
145 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014371015647.90
146 rdf:type schema:Person
147 sg:person.014435152743.83 schema:affiliation grid-institutes:grid.5596.f
148 schema:familyName Verbauwhede
149 schema:givenName Ingrid
150 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014435152743.83
151 rdf:type schema:Person
152 sg:person.014464203672.97 schema:affiliation grid-institutes:grid.5596.f
153 schema:familyName Piessens
154 schema:givenName Frank
155 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014464203672.97
156 rdf:type schema:Person
157 grid-institutes:grid.5596.f schema:alternateName iMinds-COSIC, KU Leuven, Kasteelpark Arenberg 10, 3001, Leuven, Belgium
158 iMinds-DistriNet, KU Leuven, Celestijnenlaan 200A, 3001, Leuven, Belgium
159 schema:name iMinds-COSIC, KU Leuven, Kasteelpark Arenberg 10, 3001, Leuven, Belgium
160 iMinds-DistriNet, KU Leuven, Celestijnenlaan 200A, 3001, Leuven, Belgium
161 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...