Architectures for Practical Client-Side Security
- ๐ค Speaker: Virgil Gligor, Carnegie Mellon University
- ๐ Date & Time: Tuesday 03 May 2011, 15:45 - 16:45
- ๐ Venue: Lecture Theatre 2, Computer Laboratory, William Gates Building
Abstract
Few of the security architectures proposed for the past four decades (e.g., fine-grain domains of protection, security kernels, virtual machines) have made a significant difference on client-side security. In this presentation, I examine some of the reasons for this and some of the lessons learned to date. Focus on client-side security is warranted primarily because it is substantially more difficult to achieve than server security in practice, since clients interact with human users directly and have to support their security needs. I argue that system and application partitioning to meet user security needs is now feasible [2,3,5], and that special focus must be placed on how to design and implement trustworthy communication between users and their partitions and between partitions themselves.
Trustworthy communication goes beyond secure channels, firewalls, guards and filters. The extent to which one partition accepts input from or outputs to another depends on the trust established with the input provider and output receiver. It also depends on input-rate throttling and output propagation control, which often require establishing some degree of control over remote communication end points. I illustrate some of the fundamental challenges of trustworthy communication at the user level, and introduce the notion of optimistic trust with its technical requirements for deterrence for non-compliant input providers and output receivers. Useful insights for trustworthy communication are derived from the behavioral economics, biology [1] and social [4] aspects of trust.
References
[1] E. Fehr, โOn the Economics and Biology of Trust,โ Journal of the European Economic Association, April โ May 2009, pp. 235-266.
[2] B. Lampson, ``Usable Security: How to Get it,โ Comm. of the ACM , vol. 52, no. 11, Nov. 2009.
[3] J. McCune, Y. Li, N. Qu, Z. Zhou, A. Datta, V. Gligor, and A. Perrig, ``TrustVisor: Efficient TCB Reduction and Attestation,โ Proc. of IEEE Symp. on Security and Privacy, Oakland, CA, May 2010.
[4] F. Stajano and P. Wilson, โUnderstanding Scam Victims: Seven Principles for Systems Security,โ University of Cambridge Computing Laboratory, UCAM -CL-TR-754, Aug. 2009.
[5] A. Vasudevan, B. Parno, N. Qu, V. Gligor and A. Perrig, ``Lockdown: A Safe and Practical Environment for Security Applications,โ Technical Report, CMU -CyLab-09-011, July 14, 2009.
Series This talk is part of the Computer Laboratory Security Seminar series.
Included in Lists
- All Talks (aka the CURE list)
- bld31
- Cambridge talks
- Computer Laboratory Security Seminar
- Department of Computer Science and Technology talks and seminars
- Interested Talks
- Lecture Theatre 2, Computer Laboratory, William Gates Building
- School of Technology
- Security-related talks
- Trust & Technology Initiative - interesting events
- yk449
Note: Ex-directory lists are not shown.
![[Talks.cam]](/static/images/talkslogosmall.gif)

Virgil Gligor, Carnegie Mellon University
Tuesday 03 May 2011, 15:45-16:45