Protected Software Module Architectures View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2013

AUTHORS

Raoul Strackx , Job Noorman , Ingrid Verbauwhede , Bart Preneel , Frank Piessens

ABSTRACT

A significant fraction of Internet-connected computing devices is infected with malware. With the increased connectivity and software extensibility of embedded and industrial devices, this threat is now also relevant for our industrial infrastructure and our personal environments. Since many of these devices interact with remote parties for security-critical or privacy sensitive transactions, it is important to develop security architectures that allow a stakeholder to assess the trustworthiness of a computing device, and that allow such stakeholders to securely execute software on that device. Over the past decade, the security research community has proposed and evaluated such architectures. Important and promising examples are protected software module architectures. These architectures support the secure execution of small protected software modules even on devices that are malware infected. They also make it possible for remote parties to collect trust evidence about a device; the remote party can use the security architecture to collect measurements that give assurance that the device is in a trustworthy state.In this paper we outline the essential ideas behind this promising recent line of security research, and report on our experiences in developing several protected module architectures for different types of devices. More... »

PAGES

241-251

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-658-03371-2_21

DOI

http://dx.doi.org/10.1007/978-3-658-03371-2_21

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1049513757


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0803", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Computer Software", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0806", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information Systems", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "iMinds-DistriNet, KU Leuven, Celestijnenlaan 200A, 3001, Leuven, Belgium", 
          "id": "http://www.grid.ac/institutes/grid.5596.f", 
          "name": [
            "iMinds-DistriNet, KU Leuven, Celestijnenlaan 200A, 3001, Leuven, Belgium"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Strackx", 
        "givenName": "Raoul", 
        "id": "sg:person.014371015647.90", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014371015647.90"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "iMinds-DistriNet, KU Leuven, Celestijnenlaan 200A, 3001, Leuven, Belgium", 
          "id": "http://www.grid.ac/institutes/grid.5596.f", 
          "name": [
            "iMinds-DistriNet, KU Leuven, Celestijnenlaan 200A, 3001, Leuven, Belgium"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Noorman", 
        "givenName": "Job", 
        "id": "sg:person.012354071717.95", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012354071717.95"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "iMinds-COSIC, KU Leuven, Kasteelpark Arenberg 10, 3001, Leuven, Belgium", 
          "id": "http://www.grid.ac/institutes/grid.5596.f", 
          "name": [
            "iMinds-COSIC, KU Leuven, Kasteelpark Arenberg 10, 3001, Leuven, Belgium"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Verbauwhede", 
        "givenName": "Ingrid", 
        "id": "sg:person.014435152743.83", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014435152743.83"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "iMinds-COSIC, KU Leuven, Kasteelpark Arenberg 10, 3001, Leuven, Belgium", 
          "id": "http://www.grid.ac/institutes/grid.5596.f", 
          "name": [
            "iMinds-COSIC, KU Leuven, Kasteelpark Arenberg 10, 3001, Leuven, Belgium"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Preneel", 
        "givenName": "Bart", 
        "id": "sg:person.011115044357.39", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011115044357.39"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "iMinds-DistriNet, KU Leuven, Celestijnenlaan 200A, 3001, Leuven, Belgium", 
          "id": "http://www.grid.ac/institutes/grid.5596.f", 
          "name": [
            "iMinds-DistriNet, KU Leuven, Celestijnenlaan 200A, 3001, Leuven, Belgium"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Piessens", 
        "givenName": "Frank", 
        "id": "sg:person.014464203672.97", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014464203672.97"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2013", 
    "datePublishedReg": "2013-01-01", 
    "description": "A significant fraction of Internet-connected computing devices is infected with malware. With the increased connectivity and software extensibility of embedded and industrial devices, this threat is now also relevant for our industrial infrastructure and our personal environments. Since many of these devices interact with remote parties for security-critical or privacy sensitive transactions, it is important to develop security architectures that allow a stakeholder to assess the trustworthiness of a computing device, and that allow such stakeholders to securely execute software on that device. Over the past decade, the security research community has proposed and evaluated such architectures. Important and promising examples are protected software module architectures. These architectures support the secure execution of small protected software modules even on devices that are malware infected. They also make it possible for remote parties to collect trust evidence about a device; the remote party can use the security architecture to collect measurements that give assurance that the device is in a trustworthy state.In this paper we outline the essential ideas behind this promising recent line of security research, and report on our experiences in developing several protected module architectures for different types of devices.", 
    "editor": [
      {
        "familyName": "Reimer", 
        "givenName": "Helmut", 
        "type": "Person"
      }, 
      {
        "familyName": "Pohlmann", 
        "givenName": "Norbert", 
        "type": "Person"
      }, 
      {
        "familyName": "Schneider", 
        "givenName": "Wolfgang", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-658-03371-2_21", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-658-03370-5", 
        "978-3-658-03371-2"
      ], 
      "name": "ISSE 2013 Securing Electronic Business Processes", 
      "type": "Book"
    }, 
    "keywords": [
      "software modules", 
      "security architecture", 
      "remote parties", 
      "Internet-connected computing devices", 
      "security research community", 
      "module architecture", 
      "software extensibility", 
      "secure execution", 
      "trust evidence", 
      "sensitive transactions", 
      "computing devices", 
      "trustworthy state", 
      "security research", 
      "such architectures", 
      "architecture", 
      "research community", 
      "industrial devices", 
      "malware", 
      "personal environment", 
      "industrial infrastructure", 
      "devices", 
      "essential idea", 
      "module", 
      "such stakeholders", 
      "recent line", 
      "promising example", 
      "execution", 
      "software", 
      "extensibility", 
      "trustworthiness", 
      "infrastructure", 
      "transactions", 
      "parties", 
      "connectivity", 
      "different types", 
      "assurance", 
      "stakeholders", 
      "environment", 
      "past decade", 
      "idea", 
      "threat", 
      "example", 
      "research", 
      "significant fraction", 
      "experience", 
      "community", 
      "paper", 
      "state", 
      "measurements", 
      "decades", 
      "types", 
      "lines", 
      "fraction", 
      "evidence"
    ], 
    "name": "Protected Software Module Architectures", 
    "pagination": "241-251", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1049513757"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-658-03371-2_21"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-658-03371-2_21", 
      "https://app.dimensions.ai/details/publication/pub.1049513757"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-10-01T06:55", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20221001/entities/gbq_results/chapter/chapter_258.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-658-03371-2_21"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-658-03371-2_21'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-658-03371-2_21'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-658-03371-2_21'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-658-03371-2_21'


 

This table displays all metadata directly associated to this object as RDF triples.

161 TRIPLES      22 PREDICATES      81 URIs      72 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-658-03371-2_21 schema:about anzsrc-for:08
2 anzsrc-for:0803
3 anzsrc-for:0804
4 anzsrc-for:0806
5 schema:author N69f684bca67f4fa2994e36189dc6bc8f
6 schema:datePublished 2013
7 schema:datePublishedReg 2013-01-01
8 schema:description A significant fraction of Internet-connected computing devices is infected with malware. With the increased connectivity and software extensibility of embedded and industrial devices, this threat is now also relevant for our industrial infrastructure and our personal environments. Since many of these devices interact with remote parties for security-critical or privacy sensitive transactions, it is important to develop security architectures that allow a stakeholder to assess the trustworthiness of a computing device, and that allow such stakeholders to securely execute software on that device. Over the past decade, the security research community has proposed and evaluated such architectures. Important and promising examples are protected software module architectures. These architectures support the secure execution of small protected software modules even on devices that are malware infected. They also make it possible for remote parties to collect trust evidence about a device; the remote party can use the security architecture to collect measurements that give assurance that the device is in a trustworthy state.In this paper we outline the essential ideas behind this promising recent line of security research, and report on our experiences in developing several protected module architectures for different types of devices.
9 schema:editor N6398af02ae654263bba493fd2e3a8c4d
10 schema:genre chapter
11 schema:isAccessibleForFree true
12 schema:isPartOf N8df02afe7c034e1f9b1122012f01e874
13 schema:keywords Internet-connected computing devices
14 architecture
15 assurance
16 community
17 computing devices
18 connectivity
19 decades
20 devices
21 different types
22 environment
23 essential idea
24 evidence
25 example
26 execution
27 experience
28 extensibility
29 fraction
30 idea
31 industrial devices
32 industrial infrastructure
33 infrastructure
34 lines
35 malware
36 measurements
37 module
38 module architecture
39 paper
40 parties
41 past decade
42 personal environment
43 promising example
44 recent line
45 remote parties
46 research
47 research community
48 secure execution
49 security architecture
50 security research
51 security research community
52 sensitive transactions
53 significant fraction
54 software
55 software extensibility
56 software modules
57 stakeholders
58 state
59 such architectures
60 such stakeholders
61 threat
62 transactions
63 trust evidence
64 trustworthiness
65 trustworthy state
66 types
67 schema:name Protected Software Module Architectures
68 schema:pagination 241-251
69 schema:productId Na3513beada6d4c0db9ec9be090abfb59
70 Ndadb5ccf626142e2baa17a1e376bea75
71 schema:publisher N6b6ea99a050f4ad28f1577739fe0da02
72 schema:sameAs https://app.dimensions.ai/details/publication/pub.1049513757
73 https://doi.org/10.1007/978-3-658-03371-2_21
74 schema:sdDatePublished 2022-10-01T06:55
75 schema:sdLicense https://scigraph.springernature.com/explorer/license/
76 schema:sdPublisher Ne7ead75b8a524745839ba5d5d5d4087a
77 schema:url https://doi.org/10.1007/978-3-658-03371-2_21
78 sgo:license sg:explorer/license/
79 sgo:sdDataset chapters
80 rdf:type schema:Chapter
81 N284a1ada8768469188e303fc43c15789 schema:familyName Schneider
82 schema:givenName Wolfgang
83 rdf:type schema:Person
84 N4312f7c98867404887e14861884d3729 rdf:first Nc134632d49494adf8521dc440927a07d
85 rdf:rest Nf0ee1604f9c24333b734848322e7620f
86 N5a4a1c76c402400da346bf03d6891fa7 rdf:first sg:person.012354071717.95
87 rdf:rest Ndc46e6553b014a54908ac23125e6756f
88 N6398af02ae654263bba493fd2e3a8c4d rdf:first Nebaff300b38d4d84bbcac27cf8eba803
89 rdf:rest N4312f7c98867404887e14861884d3729
90 N69f684bca67f4fa2994e36189dc6bc8f rdf:first sg:person.014371015647.90
91 rdf:rest N5a4a1c76c402400da346bf03d6891fa7
92 N6b6ea99a050f4ad28f1577739fe0da02 schema:name Springer Nature
93 rdf:type schema:Organisation
94 N8df02afe7c034e1f9b1122012f01e874 schema:isbn 978-3-658-03370-5
95 978-3-658-03371-2
96 schema:name ISSE 2013 Securing Electronic Business Processes
97 rdf:type schema:Book
98 Na3513beada6d4c0db9ec9be090abfb59 schema:name doi
99 schema:value 10.1007/978-3-658-03371-2_21
100 rdf:type schema:PropertyValue
101 Naa9e7574fcb748db994438af13f337b2 rdf:first sg:person.014464203672.97
102 rdf:rest rdf:nil
103 Nc134632d49494adf8521dc440927a07d schema:familyName Pohlmann
104 schema:givenName Norbert
105 rdf:type schema:Person
106 Ndadb5ccf626142e2baa17a1e376bea75 schema:name dimensions_id
107 schema:value pub.1049513757
108 rdf:type schema:PropertyValue
109 Ndc46e6553b014a54908ac23125e6756f rdf:first sg:person.014435152743.83
110 rdf:rest Nf943e07f05734a029c2681107bec00c9
111 Ne7ead75b8a524745839ba5d5d5d4087a schema:name Springer Nature - SN SciGraph project
112 rdf:type schema:Organization
113 Nebaff300b38d4d84bbcac27cf8eba803 schema:familyName Reimer
114 schema:givenName Helmut
115 rdf:type schema:Person
116 Nf0ee1604f9c24333b734848322e7620f rdf:first N284a1ada8768469188e303fc43c15789
117 rdf:rest rdf:nil
118 Nf943e07f05734a029c2681107bec00c9 rdf:first sg:person.011115044357.39
119 rdf:rest Naa9e7574fcb748db994438af13f337b2
120 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
121 schema:name Information and Computing Sciences
122 rdf:type schema:DefinedTerm
123 anzsrc-for:0803 schema:inDefinedTermSet anzsrc-for:
124 schema:name Computer Software
125 rdf:type schema:DefinedTerm
126 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
127 schema:name Data Format
128 rdf:type schema:DefinedTerm
129 anzsrc-for:0806 schema:inDefinedTermSet anzsrc-for:
130 schema:name Information Systems
131 rdf:type schema:DefinedTerm
132 sg:person.011115044357.39 schema:affiliation grid-institutes:grid.5596.f
133 schema:familyName Preneel
134 schema:givenName Bart
135 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011115044357.39
136 rdf:type schema:Person
137 sg:person.012354071717.95 schema:affiliation grid-institutes:grid.5596.f
138 schema:familyName Noorman
139 schema:givenName Job
140 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012354071717.95
141 rdf:type schema:Person
142 sg:person.014371015647.90 schema:affiliation grid-institutes:grid.5596.f
143 schema:familyName Strackx
144 schema:givenName Raoul
145 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014371015647.90
146 rdf:type schema:Person
147 sg:person.014435152743.83 schema:affiliation grid-institutes:grid.5596.f
148 schema:familyName Verbauwhede
149 schema:givenName Ingrid
150 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014435152743.83
151 rdf:type schema:Person
152 sg:person.014464203672.97 schema:affiliation grid-institutes:grid.5596.f
153 schema:familyName Piessens
154 schema:givenName Frank
155 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014464203672.97
156 rdf:type schema:Person
157 grid-institutes:grid.5596.f schema:alternateName iMinds-COSIC, KU Leuven, Kasteelpark Arenberg 10, 3001, Leuven, Belgium
158 iMinds-DistriNet, KU Leuven, Celestijnenlaan 200A, 3001, Leuven, Belgium
159 schema:name iMinds-COSIC, KU Leuven, Kasteelpark Arenberg 10, 3001, Leuven, Belgium
160 iMinds-DistriNet, KU Leuven, Celestijnenlaan 200A, 3001, Leuven, Belgium
161 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...