Trusted Computing: Publications
Click here to download all publications in a single bibtex file
@conference{kucuk2016, title = "Exploring the use of Intel SGX for Secure Many-Party Applications", author = "Küçük, K.A. and Paverd, A. and Martin, A. and N. Asokan, and Simpson, A. and Ankele, R.", year = "2016", address = "New York, NY, USA", booktitle = "Proceedings of the 1st Workshop on System Software for Trusted Execution (SysTEX '16)", isbn = "978-1-4503-4670-2", location = "Trento, Italy", note = "The theoretical construct of a Trusted Third Party (TTP) has the potential to solve many security and privacy challenges. In particular, a TTP is an ideal way to achieve secure multiparty computation---a privacy-enhancing technique in which mutually distrusting participants jointly compute a function over their private inputs without revealing these inputs. Although there exist cryptographic protocols to achieve this, their performance often limits them to the two-party case, or to a small number of participants. However, many real-world applications involve thousands or tens of thousands of participants. Examples of this type of many-party application include privacy-preserving energy metering, location-based services, and mobile network roaming. Challenging the notion that a trustworthy TTP does not exist, recent research has shown how trusted hardware and remote attestation can be used to establish a sufficient level of assurance in a real system such that it can serve as a trustworthy remote entity (TRE). We explore the use of Intel SGX, the most recent and arguably most promising trusted hardware technology, as the basis for a TRE for many-party applications. Using privacy-preserving energy metering as a case study, we design and implement a prototype TRE using SGX, and compare its performance to a previous system based on the Trusted Platform Module (TPM). Our results show that even without specialized optimizations, SGX provides comparable performance to the optimized TPM system, and therefore has significant potential for large-scale many-party applications.", publisher = "ACM", url = "https://dl.acm.org/doi/abs/10.1145/3007788.3007793", doi = "10.1145/3007788.3007793", }
@inproceedings{Paverd2014a, title = "Privacy-Enhanced Bi-Directional Communication in the Smart Grid using Trusted Computing", author = "Paverd, Andrew J and Martin, Andrew P and Brown, Ian", year = "2014", booktitle = "Fifth IEEE International Conference on Smart Grid Communications (SmartGridComm 2014)", url = "http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=7007758", doi = "10.1109/SmartGridComm.2014.7007758", }
@incollection{Paverd2014, title = "Security and Privacy in Smart Grid Demand Response Systems", author = "Paverd, Andrew J and Martin, Andrew P and Brown, Ian", year = "2014", booktitle = "Smart Grid Security", editor = "Cuellar, Jorge", isbn = "978-3-319-10328-0", language = "English", pages = "1-15", publisher = "Springer International Publishing", series = "Lecture Notes in Computer Science", url = "http://link.springer.com/chapter/10.1007/978-3-319-10329-7_1", doi = "10.1007/978-3-319-10329-7_1", }
@phdthesis{Lyle2011, title = "Trustworthy Services Through Attestation", author = "John Lyle", year = "2011", school = "Department of Computer Science, University of Oxford", url = "http://www.cs.ox.ac.uk/people/John.Lyle/thesis-final-25-06-11.pdf", }
@article{Huh2010, title = "Managing application whitelists in trusted distributed systems", author = "Jun Ho Huh and John Lyle and Cornelius Namiluko and Andrew Martin", year = "2010", issn = "0167-739X", journal = "Future Generation Computer Systems", keywords = ""Configuration management", "Trusted computing","Trusted grid", "Virtual organisations", "Whitelisting"", url = ""http://www.sciencedirect.com/science/article/B6V06-50XCXVD-2/2/6efb0eda0beeb1edcc156190e2f843e8", volume = "In Press, Accepted Manuscript", doi = "DOI: 10.1016/j.future.2010.08.014", }
@inproceedings{lyle-tapp10, title = "Trusted Computing and Provenance: Better Together", author = "John Lyle and Andrew Martin", year = "2010", booktitle = "Proceedings of the 2nd Workshop on the Theory and Practice of Provenance", publisher = "Usenix", url = "http://www.usenix.org/events/tapp10/tech/full_papers/lyle.pdf", }
@inproceedings{DBLP:conf/trust/Lyle09, title = "Trustable Remote Verification of Web Services", author = "John Lyle", year = "2009", booktitle = "TRUST", editor = "Liqun Chen and Chris J. Mitchell and Andrew Martin", isbn = "978-3-642-00586-2", location = "Oxford, UK", month = "April", pages = "153-168", publisher = "Springer", series = "Lecture Notes in Computer Science", url = "http://dx.doi.org/10.1007/978-3-642-00587-9_10", }
@inproceedings{LyleSecureCom09, title = "On the Feasibility of Remote Attestation for Web Services", author = "John Lyle and Andrew Martin", year = "2009", booktitle = "SecureCom09: Proceedings of the International Symposium on Secure Computing", isbn = "978-0-7695-3823-5", pages = "283-288", publisher = "IEEE", url = "http://doi.ieeecomputersociety.org/10.1109/CSE.2009.213", }
@techreport{RR-08-11, title = "The Ten Page Introduction to Trusted Computing", author = "Andrew Martin", year = "2008", institution = "OUCL", month = "December", number = "RR-08-11", }