Please use this identifier to cite or link to this item:
https://www.um.edu.mt/library/oar/handle/123456789/91091
Title: | Runtime verification for trustworthy secure shell deployment |
Authors: | Curmi, Axel Colombo, Christian Vella, Mark Joseph |
Keywords: | Cryptography Computer software -- Verification Computer engineering Malware (Computer software) |
Issue Date: | 2021 |
Publisher: | Association for Computing Machinery |
Citation: | Curmi, A., Colombo, C., & Vella, M. (2021). Runtime verification for trustworthy secure shell deployment. VORTEX 2021: 5th ACM International Workshop on Verification and mOnitoring at Runtime EXecution. 30-34. |
Abstract: | Incorrect cryptographic protocol implementation and malware attacks targeting its runtime may lead to insecure execution even if the protocol design has been proven safe. This research focuses on adapting a runtime-verification-centric trusted execution environment (RV-TEE) solution to a cryptographic protocol deployment — particularly that of the Secure Shell Protocol (SSH).We aim to show that our approach, which does not require any specific security hardware or operating system modifications, is feasible through the design of a framework and work-in-progress empirical evaluation. We provide: (i) The design of the setup involving SSH, (ii) The provision of the RV-TEE setup with SSH implementation, including (iii) An overview of the property extraction process through a methodical analysis of the SSH protocol specifications. |
URI: | https://www.um.edu.mt/library/oar/handle/123456789/91091 |
Appears in Collections: | Scholarly Works - FacICTCS |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Runtime_verification_for_trustworthy_secure_shell_deployment_2021.pdf Restricted Access | 573.2 kB | Adobe PDF | View/Open Request a copy |
Items in OAR@UM are protected by copyright, with all rights reserved, unless otherwise indicated.