Authors
Scott Garriss, Ramón Cáceres, Stefan Berger, Reiner Sailer, Leendert van Doorn, Xiaolan Zhang
Publication date
2008/6/17
Book
Proceedings of the 6th international conference on Mobile systems, applications, and services
Pages
199-210
Description
Many people desire ubiquitous access to their personal computing environments. We present a system in which a user leverages a personal mobile device to establish trust in a public computing device, or kiosk, prior to resuming her environment on the kiosk. We have designed a protocol by which the mobile device determines the identity and integrity of all software loaded on the kiosk, in order to inform the user whether the kiosk is trustworthy. Our system exploits emerging hardware security technologies, namely the Trusted Platform Module and new support in x86 processors for establishing a dynamic root of trust. We have demonstrated the viability of our approach by implementing and evaluating our system on commodity hardware. Through a brief survey, we found that respondents are generally willing to endure a delay in exchange for an increased assurance of data privacy, and that the delay incurred by …
Total citations
200820092010201120122013201420152016201720182019202020212022202320242102115111513676711321
Scholar articles
S Garriss, R Cáceres, S Berger, R Sailer, L van Doorn… - Proceedings of the 6th international conference on …, 2008