Jonathan M. McCune - Pittsburgh PA, US Adrian M. Perrig - Pittsburgh PA, US Anupam Datta - Pittsburgh PA, US Virgil Dorin Gligor - Pittsburgh PA, US Yanlin Li - Pittsburgh PA, US Bryan Jeffrey Parno - Pittsburgh PA, US Amit Vasudevan - Pittsburgh PA, US Ning Qu - San Jose CA, US
A computer including a processor and a verification device. The processor in the computer performs the steps of authenticating a secure connection between a hypervisor and the verification device, measuring the identity of at least a portion of a select guest before the select guest executes any instruction, and sending a measurement of the identity of the select guest to the verification device. The verification device compares the policy stored in the verification device with the measurement of the select guest received by the verification device. The steps of authenticating, measuring, sending, and comparing are performed after receiving a signal indicative of a request to execute the select guest and without rebooting the computer.
Methods And Apparatuses For User-Verifiable Trusted Path In The Presence Of Malware
Jonathan M. McCune - Pittsburgh PA, US Adrian M. Perrig - Pittsburgh PA, US Anupam Datta - Pittsburgh PA, US Virgil D. Gligor - Pittsburgh PA, US Ning Qu - San Jose CA, US
Assignee:
CARNEGIE MELLON UNIVERSITY - Pittsburgh PA
International Classification:
G06F 21/00
US Classification:
726 1
Abstract:
An apparatus and method for establishing a trusted path between a user interface and a trusted executable, wherein the trusted path includes a hypervisor and a driver shim. The method includes measuring an identity of the hypervisor; comparing the measurement of the identity of the hypervisor with a policy for the hypervisor; measuring an identity of the driver shim; comparing the measurement of the identity of the driver shim with a policy for the driver shim; measuring an identity of the user interface; comparing the measurement of the identity of the user interface with a policy for the user interface; and providing a human-perceptible indication of whether the identity of the hypervisor, the identity of the driver shim, and the identity of the user interface correspond with the policy for the hypervisor, the policy for the driver shim, and the policy for the user interface, respectively.
Systems And Methods For Maintaining Integrity And Secrecy In Untrusted Computing Platforms
- Stuttgart, DE Emmanuel Kwame Owusu - Pittsburgh PA, US Jonathan McCarrell McCune - Santa Clara CA, US Amit Vasudevan - Pittsburgh PA, US Adrian Perrig - Zurich, CH
Assignee:
Robert Bosch GmbH - Stuttgart
International Classification:
G06F 21/62
US Classification:
713193
Abstract:
A method for operating a computing system with a trusted processor include generating a secret cryptographic key based on a physically unclonable function in at least one hardware component in the trusted processor, generating a first public key and first private key using first secret cryptographic key, and executing instruction code corresponding to a first software program. The method further includes generating output data with the trusted processor during execution of the first software program, generating encrypted data corresponding to the output data using the first public key for at least a portion of the encryption, generating a signature of the encrypted data, and transmitting with an input/output (I/O) interface operatively connected to the trusted processor the encrypted data and the signature for storage in an untrusted memory.
Name / Title
Company / Classification
Phones & Addresses
Jonathan M. Mccune Principal
Nofuss Security, Inc Detective/Armored Car Services
Google - San Francisco Bay Area since Nov 2012
Engineer
Carnegie Mellon University - Greater Pittsburgh Area Feb 2009 - Oct 2012
Research Systems Scientist
VMware Feb 2008 - May 2008
Trusted Computing Consultant
IBM May 2005 - Aug 2005
Research Intern
Microsoft May 2002 - Aug 2002
SDET Intern
Education:
Carnegie Mellon University 2005 - 2009
PhD, Systems Security
Carnegie Mellon University 2003 - 2005
MS, Electrical and Computer Engineering
University of Virginia 1999 - 2003
BS, Computer Engineering