Publications
Trust 2012 Proceedings will be published in Springer in the LNCS series. 2011 Proceedings are now available online.
Papers published and presented at previous Trust conferences:
Trust 2011 - Accepted Papers
- Verifying Trustworthiness of Virtual Appliances in Collaborative Environments
Cornelius Namiluko, Jun Ho Huh and Andrew Martin
- Towards a Trustworthy, Lightweight Cloud Computing Framework for Embedded Systems
Kurt Dietrich and Johannes Winter
- Side-Channel Analysis of PUFs and Fuzzy Extractors
Dominik Merli, Dieter Schuster, Frederic Stumpf and Georg Sigl
- Coalition Resistant Anonymous Broadcast Encryption Scheme Based on PUF
Lukasz Krzywiecki and Miroslaw Kutylowski
- A Practical Device Authentication Scheme Using SRAM PUFs
Patrick Koeberl, Jiangtao Li, Anand Rajan, Claire Vishik and Wei Wu
- Practical Property-Based Attestation on Mobile Devices
Kari Kostiainen, N. Asokam and Jan-Erik Ekberg
- Taming Information-Stealing Smartphone Applications (on Android)
Yajin Zhou, Xinwen Zhang, Xuxian Jiang and Vincent W. Freeh
- Towards Permission-Based Attestation for the Android Platform - (Short Paper)
Ingo Bente, Gabi Dreo, Bastian Hellmann, Stephan Heuser, Joerg Vieweg, Josef von Helden and Johannes Westhuis
- Trusting to Learn: Trust and Privacy Issues in Serious Games
Ruirui C. Huang, David Grawrock, David C. Doughty and G. Edward Suh
- CPU Support for Secure Executables
Peter Williams and Rick Boivie
- Extracting Device Fingerprints from Flash Memory by Exploiting Physical Variations
Pravin Prabhu, Ameen Akel, Laura M. Grupp, Wing-Kei S. Yu, G. Edward Suh, Edwin Kan and Steven Swanson
- Enforcing Executing-Implies-Verified with the Integrity-Aware Processor
Michael LeMay and Carl A. Gunter
- Home-Network Threats and Access Controls
Mark Baugher and Victor Lortz
- Contego: Capability-Based Access Control for Web Browsers - (Short Paper)
Tongbo Luo and Wenliang Du
- Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information
Emiliano De Cristofaro, Yanbin Lu and Gene Tsudik
- CertainLogic: A Logic for Modeling Trust and Uncertainty - (Short Paper)
Sebastian Ries, Sheikh Mahbub Habib, Max Mühlhäuser and Vijay Varadharajan
- AS-TRUST: A Trust Quantification Scheme for Autonomous Systems in BGP
Jian Chang, Krishna K. Venkatasubramanian, Andrew G. West, Sampath Kannan, Boon Thau Loo, Oleg Sokolsky and Insup Lee
- Incentivizing Responsible Networking via Introduction-Based Routing
Gregory Frazier, Quang Duong, Michael P. Wellman and Edward Petersen
- Catching the Cuckoo: Verifying TPM Proximity Using a Quote Timing Side-Channel - (Short Paper)
Russell A. Fink, Alan T. Sherman, Alexander O. Mitchell and David C. Challener
- Group Distance Bounding Protocols - (Short Paper)
Srdjan Capkun, Karim M. El Defrawy and Gene Tsudik
Trust 2010 - Accepted Papers
Technical Strand
- SBAP:Software-Based Attestation for Peripherals
Yanlin Li and Jonathan M. McCune and Adrian Perrig (CyLab, Carnegie Mellon University)
- Robust Combiners for Software Hardening - Extended Abstract (Short Paper)
Amir Herzberg and Haya Shulman (Bar Ilan University)
- Engineering Attestable Services (Short Paper)
John Lyle and Andrew Martin (Oxford University Computing Laboratory)
- A DAA Scheme Using Batch Proof and Verification
Liqun Chen (HP Labs)
- Introducing the Trusted Virtual Environment Module (TVEM): A New Mechanism for Rooting Trust in Cloud Computing
F. John Krautheim and Dhananjay S. Phatak and Alan T. Sherman (UMBC)
- A Pairing-Based DAA Scheme Further Reducing TPM Resources
Ernie Brickell and Jiangtao Li (Intel Corporation)
- An Anonymous Attestation Scheme with Optional Traceability
Jiangtao Li and Anand Rajan (Intel Corporation)
- Beyond Kernel-level Integrity Measurement: Enabling Remote Attestation for the Android Platform
Mohammad Nauman and Sohail Khan and Xinwen Zhang and Jean-Pierre Seifert (Institute of Management Sciences Pakistan and Samsung Information Systems America, USA and Technische Universität Berlin & Deutsche Telekom Laboratories)
- Dynamic Enforcement of Platform Integrity (Short Paper)
Martin Pirker and Ronald Toegl and Michael Gissing (Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Austria)
- An Improved Memory Integrity Protection Scheme (Short Paper)
Yin Hu and Berk Sunar (ECE Department, WPI)
- Group-Based Attestation: Enhancing Privacy and Management in Remote Attestation
Sami Alsouri and Oezguer Dagdelen and Stefan Katzenbeisser (TU Darmstadt)
- The PUF Promise (Short Paper)
Heike Busch and Miroslava Sotakova and and Stefan Katzenbeisser and Radu Sion (TU Darmstadt and Stony Brook University)
- Requirements for an Integrity-Protected Hypervisor on the x86 Hardware Virtualized Architecture
Amit Vasudevan and Jonathan M. McCune and Ning Qu and Leendert van Doorn and Adrian Perrig (CyLab/CMU and Nvidia Corp. and AMD)
- Key Attestation from Trusted Execution Environments
Kari Kostiainen and Alexandra Dmitrienko and Jan-Erik Ekberg and Ahmad-Reza Sadeghi and N. Asokan (Nokia Research Center Helsinki, Finland and Ruhr-University Bochum, Germany)
- Lagrangian E-Voting: Verifiability on Demand and Strong Privacy
Lukasz Krzywiecki and Miroslaw Kutylowski (Wroclaw University of Technology)
- Application of Trusted Computing in Automation to Prevent Product Piracy
Nora Lieberknecht (Research Center for Information Technology, Embedded Systems and Sensors Engineering (ESS))
- Anonymous Authentication with TLS and DAA
Emanuele Cesena and Hans Loehr and Gianluca Ramunno and Ahmad-Reza Sadeghi and Davide Vernizzi (Politecnico di Torino, Italy; Ruhr-University Bochum, Germany)
- Towards A Trusted Mobile Desktop
Marcel Selhorst and Christian Stüble and Utz Gnaida and Florian Feldmann (Sirrix AG and Federal Office for Information Security (BSI), Germany)
- Escrowed Data and the Digital Envelope (Short Paper)
King Ables and Mark D. Ryan (University of Birmingham, UK)
- microTSS - A Simplified Trusted Software Stack
Christian Stüble and Anoosheh Zaerin (Sirrix AG)
- SegSlice: Towards a New Class of Secure Programming Primitives for Trustworthy Platforms
Sergey Bratus and Michael E. Locasto and Brian Schulte (Dartmouth College and George Mason University)
Socio-Economic Strand
- Can Competitive Insurers improve Network Security?
Nikhil Shetty and Galina Schwartz and Jean Walrand (EECS, UC Berkeley)
- The Leap of Faith from Online to Offline: An exploratory study of Couchsurfing.org
Jun-E Tan (Nanyang Technological University, Singapore)
- Axiomatic and Behavioural Trust
Clark Thomborson (University of Auckland)
- The Role of Soft Information in Trust Building: Evidence from Online Social Lending
Stefanie Pötzsch and Rainer Böhme (TU Dresden and International Computer Science Institute Berkeley)
- Nudge: Intermediaries' Role in Interdependent Network Security
Jens Grossklags and Svetlana Radosavac and Alvaro Cardenas and John Chuang (Princeton University, DoCoMo USA Labs, Fujitsu Laboratories of America, University of California at Berkeley)
- Ignore These At Your Peril: Ten principles for trust design
Jens Riegelsberger and M. Angela Sasse (Google Research UK and University College London UK)
- How the Public Views Strategies Designed to Reduce the Threat of Botnets
Brent Rowe and Dallas Wood and Douglas Reeves (RTI International and NC State University)
- Privacy Requirements Engineering for Trustworthy e-government Services
Nikos Vrakas and Christos Kalloniatis and Aggeliki Tsohou and Costas Lambrinoudakis
- Software on the witness stand: what should it take for us to trust it?
Sergey Bratus and Ashlyn Lembree and Anna Shubina (Dartmouth, Franklin Pierce, Dartmouth)
Trust 2009
- Towards a Programmable TPM
Paul England and Talha Tariq - ACPI: Design Principles and Concerns
Loïc Duflot, Olivier Levillain and Benjamin Morin - Implementation Aspects of Mobile and Embedded Trusted Computing
Kurt Dietrich and Johannes Winter - Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels
Hans Löhr, Ahmad-Reza Sadeghi, Christian Stüble, Marion Weber and Marcel Winandy - Remote Attestation of Attribute Updates and Information Flows in a UCON System
Mohammad Nauman, Masoom Alam, Xinwen Zhang and Tamleek Ali - Measuring Semantic Integrity for Remote Attestation
Fabrizio Baiardi, Diego Cilea, Daniele Sgandurra and Francesco Ceccarelli - A PrivacyCA for Anonymity and Trust
Martin Pirker, Ronald Toegl, Daniel Hein and Peter Danner - Revocation of TPM Keys
Stefan Katzenbeisser, Klaus Kursawe and Frederic Stumpf - Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture
Timothy E. Levin, Jeffrey S. Dwoskin, Ganesha Bhaskara, Thuy D. Nguyen, Paul C. Clark, Ruby B. Lee, Cynthia E. Irvine and Terry V. Benzel - Trustable Remote Verification of Web Services
John Lyle - Trustworthy Log Reconciliation for Distributed Virtual Organisations
Jun Ho Huh and John Lyle - Attacking the BitLocker Boot Process
Sven Türpe, Andreas Poller, Jan Steffan, Jan-Peter Stotz and Jan Trukenmüller - Secure VPNs for Trusted Computing Environments
Steffen Schulz and Ahmad-Reza Sadeghi - Merx: Secure and Privacy Preserving Delegated Payments
Christopher Soghoian and Imad Aad - A Property-Dependent Agent Transfer Protocol
Eimear Gallery, Aarthi Nagarajan and Vijay Varadharajan
Trust 2008
- Practical Techniques for Operating System Attestation
Paul England
- TOCTOU, Traps, and Trusted Computing
Sergey Bratus, Nihal D’Cunha, Evan Sparks and Sean W. Smith
- A Software-Based Trusted Platform Module Emulator
Mario Strasser and Heiko Stamer
- Towards Trust Services for Language-Based Virtual Machines for Grid Computing
Tobias Vejda, Ronald Toegl, Martin Pirker and Thomas Winkler
- Embedded Trusted Computing with Authenticated Non-volatile Memory
Dries Schellekens, Pim Tuyls and Bart Preneel
- The Zurich Trusted Information Channel – An Efficient Defence Against Man-in-the-Middle and Malicious Software Attacks
Thomas Weigold, Thorsten Kramp, Reto Hermann, Frank Höring, Peter Buhler and Michael Baentsch
- A Model for New Zealand’s Identity Verification Service
Clark Thomborson
- Pseudonymous Mobile Identity Architecture Based on Government-Supported PKI
Konstantin Hyppönen, Marko Hassinen and Elena Trichina
- Para-Virtualized TPM Sharing
Paul England and Jork Loeser
- Slicing for Security of Code
Benjamin Monate and Julien Signoles
- Trusted Computing Serving an Anonymity Service
Alexander Böttcher, Bernhard Kauer and Hermann Härtig
- Combining Biometric Authentication with Privacy-Enhancing Technologies
Konstantin Hyppönen, Marko Hassinen and Elena Trichina
- A New Direct Anonymous Attestation Scheme from Bilinear Maps
Ernie Brickell, Liqun Chen and Jiangtao Li
- On a Possible Privacy Flaw in Direct Anonymous Attestation (DAA)
Adrian Leung, Liqun Chen and Chris J. Mitchell