Please use this identifier to cite or link to this item:
https://www.um.edu.mt/library/oar/handle/123456789/91091
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Curmi, Axel | - |
dc.contributor.author | Colombo, Christian | - |
dc.contributor.author | Vella, Mark Joseph | - |
dc.date.accessioned | 2022-03-10T11:14:38Z | - |
dc.date.available | 2022-03-10T11:14:38Z | - |
dc.date.issued | 2021 | - |
dc.identifier.citation | Curmi, A., Colombo, C., & Vella, M. (2021). Runtime verification for trustworthy secure shell deployment. VORTEX 2021: 5th ACM International Workshop on Verification and mOnitoring at Runtime EXecution. 30-34. | en_GB |
dc.identifier.uri | https://www.um.edu.mt/library/oar/handle/123456789/91091 | - |
dc.description.abstract | Incorrect cryptographic protocol implementation and malware attacks targeting its runtime may lead to insecure execution even if the protocol design has been proven safe. This research focuses on adapting a runtime-verification-centric trusted execution environment (RV-TEE) solution to a cryptographic protocol deployment — particularly that of the Secure Shell Protocol (SSH).We aim to show that our approach, which does not require any specific security hardware or operating system modifications, is feasible through the design of a framework and work-in-progress empirical evaluation. We provide: (i) The design of the setup involving SSH, (ii) The provision of the RV-TEE setup with SSH implementation, including (iii) An overview of the property extraction process through a methodical analysis of the SSH protocol specifications. | en_GB |
dc.language.iso | en | en_GB |
dc.publisher | Association for Computing Machinery | en_GB |
dc.rights | info:eu-repo/semantics/restrictedAccess | en_GB |
dc.subject | Cryptography | en_GB |
dc.subject | Computer software -- Verification | en_GB |
dc.subject | Computer engineering | en_GB |
dc.subject | Malware (Computer software) | en_GB |
dc.title | Runtime verification for trustworthy secure shell deployment | en_GB |
dc.type | conferenceObject | en_GB |
dc.rights.holder | The copyright of this work belongs to the author(s)/publisher. The rights of this work are as defined by the appropriate Copyright Legislation or as modified by any successive legislation. Users may access this work and can make use of the information contained in accordance with the Copyright Legislation provided that the author must be properly acknowledged. Further distribution or reproduction in any format is prohibited without the prior permission of the copyright holder. | en_GB |
dc.bibliographicCitation.conferencename | VORTEX 2021: 5th ACM International Workshop on Verification and mOnitoring at Runtime EXecution | en_GB |
dc.bibliographicCitation.conferenceplace | Virtually, 12/07/2021 | en_GB |
dc.description.reviewed | peer-reviewed | en_GB |
dc.identifier.doi | 10.1145/3464974.3468449 | - |
Appears in Collections: | Scholarly Works - FacICTCS |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Runtime_verification_for_trustworthy_secure_shell_deployment_2021.pdf Restricted Access | 573.2 kB | Adobe PDF | View/Open Request a copy |
Items in OAR@UM are protected by copyright, with all rights reserved, unless otherwise indicated.