Non-invasive methods for host certification

Patrick Traynor, Michael Chien, Scott Weaver, Boniface Hicks, Patrick McDaniel

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Determining whether a user or system is exercising appropriate security practices is difficult in any context. Such difficulties are particularly pronounced when uncontrolled or unknown platforms join public networks. Commonly practiced techniques used to vet these hosts, such as system scans, have the potential to infringe upon the privacy of users. In this paper, we show that it is possible for clients to prove both the presence and proper functioning of security infrastructure without allowing unrestricted access to their system. We demonstrate this approach, specifically applied to anti-virus security, by requiring clients seeking admission to a network to positively identify the presence or absence of malcode in a series of puzzles. The implementation of this mechanism and its application to real networks are also explored. In so doing, we demonstrate that it is not necessary for an administrator to be invasive to determine whether a client implements good security practices.

Original languageEnglish (US)
Title of host publication2006 Securecomm and Workshops
DOIs
StatePublished - 2006
Event2006 Securecomm and Workshops - Baltimore, MD, United States
Duration: Aug 28 2006Sep 1 2006

Publication series

Name2006 Securecomm and Workshops

Other

Other2006 Securecomm and Workshops
Country/TerritoryUnited States
CityBaltimore, MD
Period8/28/069/1/06

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Communication

Fingerprint

Dive into the research topics of 'Non-invasive methods for host certification'. Together they form a unique fingerprint.

Cite this