[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1109/ACSAC.2009.19guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Scalable Web Content Attestation

Published: 07 December 2009 Publication History

Abstract

The web is a primary means of information sharing for most organizations and people. Currently, a recipient of web content knows nothing about the environment in which that information was generated other than the specific server from whence it came (and even that information can be unreliable). In this paper, we develop and evaluate the Spork system that uses the Trusted Platform Module (TPM) to tie the web server integrity state to the web content delivered to browsers, thus allowing a client to verify that the origin of the content was functioning properly when the received content was generated and/or delivered. We discuss the design and implementation of the Spork service and its browser-side Firefox validation extension. In particular, we explore the challenges and solutions of scaling the delivery of mixed static and dynamic content using exceptionally slow TPM hardware. We perform an in-depth empirical analysis of the Spork system within Apache web servers. This analysis shows Spork can deliver nearly 8,000 static or over 7,000 dynamic integrity-measured web objects per-second. More broadly, we identify how TPM-based content web services can scale with manageable overheads and deliver integrity-measured content with manageable overhead.

Cited By

View all
  • (2019)A Practical Intel SGX Setting for Linux Containers in the CloudProceedings of the Ninth ACM Conference on Data and Application Security and Privacy10.1145/3292006.3300030(255-266)Online publication date: 13-Mar-2019
  • (2014)BibliographyTrust Extension as a Mechanism for Secure Code Execution on Commodity Computers10.1145/2611399.2611408Online publication date: 5-Jun-2014
  • (2014)Trust Extension as a Mechanism for Secure Code Execution on Commodity ComputersundefinedOnline publication date: 5-Jun-2014
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
ACSAC '09: Proceedings of the 2009 Annual Computer Security Applications Conference
December 2009
492 pages
ISBN:9780769539195

Publisher

IEEE Computer Society

United States

Publication History

Published: 07 December 2009

Author Tags

  1. attestation
  2. integrity measurement
  3. scalability
  4. web content

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 15 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2019)A Practical Intel SGX Setting for Linux Containers in the CloudProceedings of the Ninth ACM Conference on Data and Application Security and Privacy10.1145/3292006.3300030(255-266)Online publication date: 13-Mar-2019
  • (2014)BibliographyTrust Extension as a Mechanism for Secure Code Execution on Commodity Computers10.1145/2611399.2611408Online publication date: 5-Jun-2014
  • (2014)Trust Extension as a Mechanism for Secure Code Execution on Commodity ComputersundefinedOnline publication date: 5-Jun-2014
  • (2013)Multi-user dynamic proofs of data possession using trusted hardwareProceedings of the third ACM conference on Data and application security and privacy10.1145/2435349.2435400(353-364)Online publication date: 18-Feb-2013
  • (2012)Verifying system integrity by proxyProceedings of the 5th international conference on Trust and Trustworthy Computing10.1007/978-3-642-30921-2_11(179-200)Online publication date: 13-Jun-2012
  • (2012)Scalable integrity-guaranteed AJAXProceedings of the 14th Asia-Pacific international conference on Web Technologies and Applications10.1007/978-3-642-29253-8_1(1-19)Online publication date: 11-Apr-2012
  • (2010)KellsProceedings of the 26th Annual Computer Security Applications Conference10.1145/1920261.1920296(231-240)Online publication date: 6-Dec-2010
  • (2010)Seeding clouds with trust anchorsProceedings of the 2010 ACM workshop on Cloud computing security workshop10.1145/1866835.1866843(43-46)Online publication date: 8-Oct-2010
  • (2010)PinDr0pProceedings of the 17th ACM conference on Computer and communications security10.1145/1866307.1866320(109-120)Online publication date: 4-Oct-2010

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media