90 likes | 219 Vues
This document discusses critical challenges and protocols for enhancing security in mobile applications, emphasizing dual protection techniques for both the remote host and mobile code. Key topics include automatic generation of optimal security protocols, access control mechanisms, cryptographic hardware tokens, and effective design for survivability. The synthesis of secure code, differential power analysis, and resource control via microauctions are explored as well, alongside strategies to ensure privacy and efficient resource allocation.
E N D
EndeavourSecurity and assurance Doug Tygar tygar@cs.berkeley.edu UC Berkeley 25 May 1999
Challenges:Protocols and Mobile Applications • Two sides for mobile applications: • protecting the remote host from the mobile code • protecting the mobile code from the remote host! • Automatic generation of best security protocol • Ad hoc and temporal access control • Access control/security negotiation • Use of cryptographic hardware tokens • How to evaluate, build, break tamper-resistant boundaries • Differential power analysis
Wider challenges • Microauctions/economics for resource control • Rights management tagging • Design for survivability • All of this with privacy
Plan • One year • Synthesis of code for optimal security protocols • Toolkit for cryptographic key management for mobile code • Design of ad hoc and temporal access control • “Little TEMPEST” protection for hardware tokens • Three year • Integration with applications across Endeavour • Privacy analysis for high assurance mechanisms • Automatic or semi-automatic resource allocation using micro-auctions. • High survivability mechanisms
Latest wrinkle -- power analysis attacks • Publicized by Paul Kocher et al. • Use current drawn by device to read off cryptographic key • Typical MOS Transistor: