Lockbox: Helping Computers Keep Your Secrets

Published as Working-group on Applied Security & Privacy Technical Report UCSC-WASP-15-02.

Abstract

The realization that modern architectures lack sufficient security features is not a new one. Many grand visions of "trusted computing" remain unfilled. After millions of dollars of research money, huge expenditures on the part of industry and rarely seen levels of cooperation between hardware vendors, users remain without substantial security features in their systems. Those features that do exist remain unused and few users urge progress. Even the strongest advocates of trusted computing have quietly ratcheted down their expectations and the current proposed uses for the TPM, a chip that was supposed to bring about revolutionary security benefits to modern computing, represent a significant departure from the original vision of the project. Despite a rapidly increasing need for security, trusted computing systems remain unimplemented, unrealized or without adoption.

Publication date:
November 2015

Authors:
D J Capelis

Projects:
User Controlled Trusted Systems

Available for download:

Full text:
Download as PDF

Bibtex entry

@techreport{wasptr-15-02,
  author       = {D J Capelis},
  title        = {Lockbox: Helping Computers Keep Your Secrets},
  institution  = {University of California, Santa Cruz},
  number       = {UCSC-WASP-15-02},
  month        = nov,
  year         = {2015},
}
Last modified 19 Nov 2015