header photo

Publications

Trust 2012 Proceedings will be published in Springer in the LNCS series. 2011 Proceedings are now available online.

Papers published and presented at previous Trust conferences:

Trust 2011 - Accepted Papers

  • Verifying Trustworthiness of Virtual Appliances in Collaborative Environments
    Cornelius Namiluko, Jun Ho Huh and Andrew Martin

  • Towards a Trustworthy, Lightweight Cloud Computing Framework for Embedded Systems
    Kurt Dietrich and Johannes Winter

  • Side-Channel Analysis of PUFs and Fuzzy Extractors
    Dominik Merli, Dieter Schuster, Frederic Stumpf and Georg Sigl

  • Coalition Resistant Anonymous Broadcast Encryption Scheme Based on PUF
    Lukasz Krzywiecki and Miroslaw Kutylowski

  • A Practical Device Authentication Scheme Using SRAM PUFs
    Patrick Koeberl, Jiangtao Li, Anand Rajan, Claire Vishik and Wei Wu

  • Practical Property-Based Attestation on Mobile Devices
    Kari Kostiainen, N. Asokam and Jan-Erik Ekberg

  • Taming Information-Stealing Smartphone Applications (on Android)
    Yajin Zhou, Xinwen Zhang, Xuxian Jiang and Vincent W. Freeh

  • Towards Permission-Based Attestation for the Android Platform - (Short Paper)
    Ingo Bente, Gabi Dreo, Bastian Hellmann, Stephan Heuser, Joerg Vieweg, Josef von Helden and Johannes Westhuis

  • Trusting to Learn: Trust and Privacy Issues in Serious Games
    Ruirui C. Huang, David Grawrock, David C. Doughty and G. Edward Suh

  • CPU Support for Secure Executables
    Peter Williams and Rick Boivie

  • Extracting Device Fingerprints from Flash Memory by Exploiting Physical Variations
    Pravin Prabhu, Ameen Akel, Laura M. Grupp, Wing-Kei S. Yu, G. Edward Suh, Edwin Kan and Steven Swanson

  • Enforcing Executing-Implies-Verified with the Integrity-Aware Processor
    Michael LeMay and Carl A. Gunter

  • Home-Network Threats and Access Controls
    Mark Baugher and Victor Lortz

  • Contego: Capability-Based Access Control for Web Browsers - (Short Paper)
    Tongbo Luo and Wenliang Du

  • Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information
    Emiliano De Cristofaro, Yanbin Lu and Gene Tsudik

  • CertainLogic: A Logic for Modeling Trust and Uncertainty - (Short Paper)
    Sebastian Ries, Sheikh Mahbub Habib, Max Mühlhäuser and Vijay Varadharajan

  • AS-TRUST: A Trust Quantification Scheme for Autonomous Systems in BGP
    Jian Chang, Krishna K. Venkatasubramanian, Andrew G. West, Sampath Kannan, Boon Thau Loo, Oleg Sokolsky and Insup Lee

  • Incentivizing Responsible Networking via Introduction-Based Routing
    Gregory Frazier, Quang Duong, Michael P. Wellman and Edward Petersen

  • Catching the Cuckoo: Verifying TPM Proximity Using a Quote Timing Side-Channel - (Short Paper)
    Russell A. Fink, Alan T. Sherman, Alexander O. Mitchell and David C. Challener

  • Group Distance Bounding Protocols - (Short Paper)
    Srdjan Capkun, Karim M. El Defrawy and Gene Tsudik

Trust 2010 - Accepted Papers

Technical Strand

  • SBAP:Software-Based Attestation for Peripherals
    Yanlin Li and Jonathan M. McCune and Adrian Perrig (CyLab, Carnegie Mellon University)

  • Robust Combiners for Software Hardening - Extended Abstract (Short Paper)
    Amir Herzberg and Haya Shulman (Bar Ilan University)

  • Engineering Attestable Services (Short Paper)
    John Lyle and Andrew Martin (Oxford University Computing Laboratory)

  • A DAA Scheme Using Batch Proof and Verification
    Liqun Chen (HP Labs)

  • Introducing the Trusted Virtual Environment Module (TVEM): A New Mechanism for Rooting Trust in Cloud Computing
    F. John Krautheim and Dhananjay S. Phatak and Alan T. Sherman (UMBC)

  • A Pairing-Based DAA Scheme Further Reducing TPM Resources
    Ernie Brickell and Jiangtao Li (Intel Corporation)

  • An Anonymous Attestation Scheme with Optional Traceability
    Jiangtao Li and Anand Rajan (Intel Corporation)

  • Beyond Kernel-level Integrity Measurement: Enabling Remote Attestation for the Android Platform
    Mohammad Nauman and Sohail Khan and Xinwen Zhang and Jean-Pierre Seifert (Institute of Management Sciences Pakistan and Samsung Information Systems America, USA and Technische Universität Berlin & Deutsche Telekom Laboratories)

  • Dynamic Enforcement of Platform Integrity (Short Paper)
    Martin Pirker and Ronald Toegl and Michael Gissing (Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Austria)

  • An Improved Memory Integrity Protection Scheme (Short Paper)
    Yin Hu and Berk Sunar (ECE Department, WPI)

  • Group-Based Attestation: Enhancing Privacy and Management in Remote Attestation
    Sami Alsouri and Oezguer Dagdelen and Stefan Katzenbeisser (TU Darmstadt)

  • The PUF Promise (Short Paper)
    Heike Busch and Miroslava Sotakova and and Stefan Katzenbeisser and Radu Sion (TU Darmstadt and Stony Brook University)

  • Requirements for an Integrity-Protected Hypervisor on the x86 Hardware Virtualized Architecture
    Amit Vasudevan and Jonathan M. McCune and Ning Qu and Leendert van Doorn and Adrian Perrig (CyLab/CMU and Nvidia Corp. and AMD)

  • Key Attestation from Trusted Execution Environments
    Kari Kostiainen and Alexandra Dmitrienko and Jan-Erik Ekberg and Ahmad-Reza Sadeghi and N. Asokan (Nokia Research Center Helsinki, Finland and Ruhr-University Bochum, Germany)

  • Lagrangian E-Voting: Verifiability on Demand and Strong Privacy
    Lukasz Krzywiecki and Miroslaw Kutylowski (Wroclaw University of Technology)

  • Application of Trusted Computing in Automation to Prevent Product Piracy
    Nora Lieberknecht (Research Center for Information Technology, Embedded Systems and Sensors Engineering (ESS))

  • Anonymous Authentication with TLS and DAA
    Emanuele Cesena and Hans Loehr and Gianluca Ramunno and Ahmad-Reza Sadeghi and Davide Vernizzi (Politecnico di Torino, Italy; Ruhr-University Bochum, Germany)

  • Towards A Trusted Mobile Desktop
    Marcel Selhorst and Christian Stüble and Utz Gnaida and Florian Feldmann (Sirrix AG and Federal Office for Information Security (BSI), Germany)

  • Escrowed Data and the Digital Envelope (Short Paper)
    King Ables and Mark D. Ryan (University of Birmingham, UK)

  • microTSS - A Simplified Trusted Software Stack
    Christian Stüble and Anoosheh Zaerin (Sirrix AG)

  • SegSlice: Towards a New Class of Secure Programming Primitives for Trustworthy Platforms
    Sergey Bratus and Michael E. Locasto and Brian Schulte (Dartmouth College and George Mason University)

Socio-Economic Strand

  • Can Competitive Insurers improve Network Security?
    Nikhil Shetty and Galina Schwartz and Jean Walrand (EECS, UC Berkeley)

  • The Leap of Faith from Online to Offline: An exploratory study of Couchsurfing.org
    Jun-E Tan (Nanyang Technological University, Singapore)

  • Axiomatic and Behavioural Trust
    Clark Thomborson (University of Auckland)

  • The Role of Soft Information in Trust Building: Evidence from Online Social Lending
    Stefanie Pötzsch and Rainer Böhme (TU Dresden and International Computer Science Institute Berkeley)

  • Nudge: Intermediaries' Role in Interdependent Network Security
    Jens Grossklags and Svetlana Radosavac and Alvaro Cardenas and John Chuang (Princeton University, DoCoMo USA Labs, Fujitsu Laboratories of America, University of California at Berkeley)

  • Ignore These At Your Peril: Ten principles for trust design
    Jens Riegelsberger and M. Angela Sasse (Google Research UK and University College London UK)

  • How the Public Views Strategies Designed to Reduce the Threat of Botnets
    Brent Rowe and Dallas Wood and Douglas Reeves (RTI International and NC State University)

  • Privacy Requirements Engineering for Trustworthy e-government Services
    Nikos Vrakas and Christos Kalloniatis and Aggeliki Tsohou and Costas Lambrinoudakis

  • Software on the witness stand: what should it take for us to trust it?
    Sergey Bratus and Ashlyn Lembree and Anna Shubina (Dartmouth, Franklin Pierce, Dartmouth)

Trust 2009

Trust 2008

News



Venue Information

05-06-2012
See Venue page for details about the Conference Venue.

Call for Posters

29-03-2012
See submission page for details.

Accepted Papers Announced

25-03-2012
See program page for accepted papers.

Registration System online

27-02-2012

Submission Deadline Extended!

22-02-2012
The paper submission deadline for TRUST 2012 has been extended to 26 February 2012.

CfP announced

31-10-2011

TRUST 2012

31-10-2011
The TRUST 2012 website is live. Please stay tuned for details on next year's conference to be held in Vienna, Austria,  13-15 June 2012.