Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware
Department of Computer Science, Columbia University
Information and Communications Security, Lecture Notes in Computer Science, 2005, Volume 3783/2005, 363-375
@article{cook2005remotely,
title={Remotely keyed cryptographics secure remote display access using (mostly) untrusted hardware},
author={Cook, D. and Baratto, R. and Keromytis, A.},
journal={Information and Communications Security},
pages={363–375},
year={2005},
publisher={Springer}
}
Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and removing it. Such software may be inadvertently installed by a user that is casually browsing the web, or may be purposely installed by an attacker, or even by the owner of a system to spy on other users of the system. This is particularly problematic in the case of utility computing, early manifestations of which are Internet.
December 13, 2010 by hgpu