How to Disembed a Program

Subscribers:
344,000
Published on ● Video Link: https://www.youtube.com/watch?v=yu4wCxRpDoc



Category:
Tutorial
Duration: 1:22:37
21 views
0


This paper presents the theoretical blueprint of a new secure token called the Externalized Microprocessor (XmP). Unlike a smart-card, the XmP contains no ROM at all. While exporting all the device's executable code to potentially untrustworthy terminals poses formidable security problems, the advantages of ROM-less secure tokens are numerous: chip masking time disappears, bug patching becomes a mere terminal update and hence does not imply any roll-out of cards in the field. Most importantly, code size ceases to be a limiting factor. This is particularly significant given the steady increase in on-board software complexity. After describing the machine's instruction-set we will introduce two XmP variants. The first design is a public-key oriented architecture which relies on a new RSA screening scheme and features a relatively low communication overhead at the cost of computational complexity, whereas the second variant is secret-key oriented and relies on simple MACs and hash functions but requires more communication. For each of these two designs, we propose two protocols that execute and dynamically authenticate arbitrary programs. We also provide a strong security model for these protocols and prove their security under appropriate complexity assumptions




Other Videos By Microsoft Research


2016-09-05Text summarization: News and Beyond
2016-09-05Data Streaming Algorithms for Efficient and Accurate Estimation of Flow Size Distribution
2016-09-05Learning and Inferring Transportation Routines
2016-09-05Raising the Bar: Integrity and Passion in Life and Business: The Story of Clif Bar, Inc.
2016-09-05Revelationary Computing, Proactive Displays and The Experience UbiComp Project
2016-09-05The Design of A Formal Property-Specification Language
2016-09-05Data Harvesting: A Random Coding Approach to Rapid Dissemination and Efficient Storage of Data
2016-09-05Runtime Refinement Checking for Concurrent Data Structures
2016-09-05Lost in Space: The Fall of NASA and the Dream of a New Space Age
2016-09-05Solving Geometric Matching Problems using Interval Arithmetic Optimization
2016-09-05How to Disembed a Program
2016-09-05Laboratory for Recognition and Organization of Speech
2016-09-05The (Mis)Behavior of Markets: A Fractal View of Risk, Ruin and Return
2016-09-05Uncovering Semantic Similarities between Query Terms
2016-09-0550/50 by 2020 -- Living Anita's vision and the importance of gender equity in technology
2016-09-05Online Auctions, Strategyproofness and Random Valuations
2016-09-05Citrine Smart Clipboard, WhyLine Interrogative Debugging, EdgeWrite Text Entry, and Pebbles PocketPC
2016-09-05Because it is there: Kili the Right Way
2016-09-05Music-specific audio content analysis
2016-09-05Hierarchical Dirichlet Processes
2016-09-05Phase-Aware Program Profiling



Tags:
microsoft research