Please use this identifier to cite or link to this item:
Title: Runtime verification for trustworthy secure shell deployment
Authors: Curmi, Axel
Colombo, Christian
Vella, Mark Joseph
Keywords: Cryptography
Computer software -- Verification
Computer engineering
Malware (Computer software)
Issue Date: 2021
Publisher: Association for Computing Machinery
Citation: Curmi, A., Colombo, C., & Vella, M. (2021). Runtime verification for trustworthy secure shell deployment. VORTEX 2021: 5th ACM International Workshop on Verification and mOnitoring at Runtime EXecution. 30-34.
Abstract: Incorrect cryptographic protocol implementation and malware attacks targeting its runtime may lead to insecure execution even if the protocol design has been proven safe. This research focuses on adapting a runtime-verification-centric trusted execution environment (RV-TEE) solution to a cryptographic protocol deployment — particularly that of the Secure Shell Protocol (SSH).We aim to show that our approach, which does not require any specific security hardware or operating system modifications, is feasible through the design of a framework and work-in-progress empirical evaluation. We provide: (i) The design of the setup involving SSH, (ii) The provision of the RV-TEE setup with SSH implementation, including (iii) An overview of the property extraction process through a methodical analysis of the SSH protocol specifications.
Appears in Collections:Scholarly Works - FacICTCS

Files in This Item:
File Description SizeFormat 
  Restricted Access
573.2 kBAdobe PDFView/Open Request a copy

Items in OAR@UM are protected by copyright, with all rights reserved, unless otherwise indicated.