Please use this identifier to cite or link to this item: https://www.um.edu.mt/library/oar/handle/123456789/91091
Full metadata record
DC FieldValueLanguage
dc.contributor.authorCurmi, Axel-
dc.contributor.authorColombo, Christian-
dc.contributor.authorVella, Mark Joseph-
dc.date.accessioned2022-03-10T11:14:38Z-
dc.date.available2022-03-10T11:14:38Z-
dc.date.issued2021-
dc.identifier.citationCurmi, A., Colombo, C., & Vella, M. (2021). Runtime verification for trustworthy secure shell deployment. VORTEX 2021: 5th ACM International Workshop on Verification and mOnitoring at Runtime EXecution. 30-34.en_GB
dc.identifier.urihttps://www.um.edu.mt/library/oar/handle/123456789/91091-
dc.description.abstractIncorrect cryptographic protocol implementation and malware attacks targeting its runtime may lead to insecure execution even if the protocol design has been proven safe. This research focuses on adapting a runtime-verification-centric trusted execution environment (RV-TEE) solution to a cryptographic protocol deployment — particularly that of the Secure Shell Protocol (SSH).We aim to show that our approach, which does not require any specific security hardware or operating system modifications, is feasible through the design of a framework and work-in-progress empirical evaluation. We provide: (i) The design of the setup involving SSH, (ii) The provision of the RV-TEE setup with SSH implementation, including (iii) An overview of the property extraction process through a methodical analysis of the SSH protocol specifications.en_GB
dc.language.isoenen_GB
dc.publisherAssociation for Computing Machineryen_GB
dc.rightsinfo:eu-repo/semantics/restrictedAccessen_GB
dc.subjectCryptographyen_GB
dc.subjectComputer software -- Verificationen_GB
dc.subjectComputer engineeringen_GB
dc.subjectMalware (Computer software)en_GB
dc.titleRuntime verification for trustworthy secure shell deploymenten_GB
dc.typeconferenceObjecten_GB
dc.rights.holderThe copyright of this work belongs to the author(s)/publisher. The rights of this work are as defined by the appropriate Copyright Legislation or as modified by any successive legislation. Users may access this work and can make use of the information contained in accordance with the Copyright Legislation provided that the author must be properly acknowledged. Further distribution or reproduction in any format is prohibited without the prior permission of the copyright holder.en_GB
dc.bibliographicCitation.conferencenameVORTEX 2021: 5th ACM International Workshop on Verification and mOnitoring at Runtime EXecutionen_GB
dc.bibliographicCitation.conferenceplaceVirtually, 12/07/2021en_GB
dc.description.reviewedpeer-revieweden_GB
dc.identifier.doi10.1145/3464974.3468449-
Appears in Collections:Scholarly Works - FacICTCS

Files in This Item:
File Description SizeFormat 
Runtime_verification_for_trustworthy_secure_shell_deployment_2021.pdf
  Restricted Access
573.2 kBAdobe PDFView/Open Request a copy


Items in OAR@UM are protected by copyright, with all rights reserved, unless otherwise indicated.