Trust and Trustworthy Computing

4th International Conference, TRUST 2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings

  • Jonathan M. McCune
  • Boris Balacheff
  • Adrian Perrig
  • Ahmad-Reza Sadeghi
  • Angela Sasse
  • Yolanta Beres
Conference proceedings Trust 2011

DOI: 10.1007/978-3-642-21599-5

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6740)

Table of contents (23 papers)

  1. Front Matter
  2. Session 1: Cloud and Virtualization

  3. Session 2: Physically Unclonable Functions

    1. Side-Channel Analysis of PUFs and Fuzzy Extractors
      Dominik Merli, Dieter Schuster, Frederic Stumpf, Georg Sigl
      Pages 33-47
    2. Coalition Resistant Anonymous Broadcast Encryption Scheme Based on PUF
      Łukasz Krzywiecki, Mirosław Kutyłowski
      Pages 48-62
    3. A Practical Device Authentication Scheme Using SRAM PUFs
      Patrick Koeberl, Jiangtao Li, Anand Rajan, Claire Vishik, Wei Wu
      Pages 63-77
  4. Session 3: Mobile Device Security

    1. Practical Property-Based Attestation on Mobile Devices
      Kari Kostiainen, N. Asokan, Jan-Erik Ekberg
      Pages 78-92
    2. Taming Information-Stealing Smartphone Applications (on Android)
      Yajin Zhou, Xinwen Zhang, Xuxian Jiang, Vincent W. Freeh
      Pages 93-107
    3. Towards Permission-Based Attestation for the Android Platform
      Ingo Bente, Gabi Dreo, Bastian Hellmann, Stephan Heuser, Joerg Vieweg, Josef von Helden et al.
      Pages 108-115
  5. Session 4: Socio-Economic Aspects of Trust

    1. Trusting to Learn: Trust and Privacy Issues in Serious Games
      Miguel Malheiros, Charlene Jennett, Will Seager, M. Angela Sasse
      Pages 116-130
    2. Modifying Trust Dynamics through Cooperation and Defection in Evolving Social Networks
      Luca Allodi, Luca Chiodi, Marco Cremonini
      Pages 131-145
  6. Session 5: Hardware Trust

    1. Systematic Security Assessment at an Early Processor Design Stage
      Ruirui Huang, David Grawrock, David C. Doughty, G. Edward Suh
      Pages 154-171
    2. CPU Support for Secure Executables
      Peter Williams, Rick Boivie
      Pages 172-187
    3. Extracting Device Fingerprints from Flash Memory by Exploiting Physical Variations
      Pravin Prabhu, Ameen Akel, Laura M. Grupp, Wing-Kei S. Yu, G. Edward Suh, Edwin Kan et al.
      Pages 188-201
  7. Session 6: Access Control

    1. Home-Network Threats and Access Controls
      Mark Baugher, Victor Lortz
      Pages 217-230
    2. Contego: Capability-Based Access Control for Web Browsers
      Tongbo Luo, Wenliang Du
      Pages 231-238
  8. Session 7: Privacy

    1. Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information
      Emiliano De Cristofaro, Yanbin Lu, Gene Tsudik
      Pages 239-253
    2. CertainLogic: A Logic for Modeling Trust and Uncertainty
      Sebastian Ries, Sheikh Mahbub Habib, Max Mühlhäuser, Vijay Varadharajan
      Pages 254-261

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 4th International Conference on Trust and Trustworthy Computing, TRUST 2011, held in Pittsburgh, PA, USA in June 2011.

The 23 revised full papers presented were carefully reviewed and selected for inclusion in the book. The papers are organized in technical sessions on cloud and virtualization, physically unclonable functions, mobile device security, socio-economic aspects of trust, hardware trust, access control, privacy, trust aspects of routing, and cryptophysical protocols.

Keywords

authentication device finger prints embedded systems security privacy preserving techniques routing security social network security trust assessment

Editors and affiliations

  • Jonathan M. McCune
    • 1
  • Boris Balacheff
    • 2
  • Adrian Perrig
    • 1
  • Ahmad-Reza Sadeghi
    • 3
  • Angela Sasse
    • 4
  • Yolanta Beres
    • 5
  1. 1.Carnegie Mellon UniversityPittsburghUSA
  2. 2.Hewlett-Packard LabsStoke GiffordUK
  3. 3.TU Darmstadt / Fraunhofer SITDarmstadtGermany
  4. 4.University College LondonLondonUK
  5. 5.Hewlett Packard LabsStoke GiffordUK

Bibliographic information

  • Copyright Information Springer-Verlag GmbH Berlin Heidelberg 2011
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-21598-8
  • Online ISBN 978-3-642-21599-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349