CyBlog: Security, Privacy and Mobility in the Information Age

Sunday, July 18, 2010

TIW 2010: Jonathan McCune for Adrian Perrig on "Software-Based Attestation: History, Constructions, Applications, Current State of Research" (6-9-10)

Jonathan McCune for Adrian Perrig on "Software-Based Attestation: History, Constructions, Applications, Current State of Research," TIW 2010, 6-9-10, CyLab/Carnegie Mellon University (Part I)



Jonathan McCune for Adrian Perrig on "Software-Based Attestation: History, Constructions, Applications, Current State of Research," TIW 2010, 6-9-10, CyLab/Carnegie Mellon University (Part II)



Jonathan McCune for Adrian Perrig on "Software-Based Attestation: History, Constructions, Applications, Current State of Research," TIW 2010, 6-9-10, CyLab/Carnegie Mellon University (Part III)



Jonathan McCune for Adrian Perrig on "Software-Based Attestation: History, Constructions, Applications, Current State of Research," TIW 2010, 6-9-10, CyLab/Carnegie Mellon University (Part IV)



For more information on TIW 2010:

Notes on TIW 2010: The Builders & Building Blocks of Trustworthy Infrastructure

CyLab Chronicles: A Report on TIW 2010

Trustworthy Infrastructure Workshop (TIW) 2010
Posted by Carnegie Mellon CyLab at 9:22 AM
Labels: Adrian Perrig, Cyber Security, CyBlog, CyLab, Information Security, Jonathan McCune, TIW 2010, Trustworthy Computing
Newer Post Older Post Home
Carnegie Mellon CyLab was founded in 2003 and is one of the largest university-based cybersecurity research and education centers in the U.S.

CyLab's unique cross-disciplinary approach draws on expertise in management and policy, economics, and psychology, as well as, software engineering, secure systems design, networking, and cryptography, to develop holistic strategies and solutions for some of the most compelling cyber challenges of the 21st Century.

More on CyLab:

  • Research
  • Education & Outreach
  • Partnership
  • News & Events
  • About CyLab

Twitter

Tweets by @cylab

Subscribe or Share CyBlog:

Subscribe in a reader

Blog Archive

  • ►  2015 (3)
    • ►  July (1)
    • ►  January (2)
  • ►  2014 (14)
    • ►  November (1)
    • ►  October (1)
    • ►  August (2)
    • ►  July (1)
    • ►  June (2)
    • ►  May (1)
    • ►  April (1)
    • ►  March (3)
    • ►  February (1)
    • ►  January (1)
  • ►  2013 (12)
    • ►  December (1)
    • ►  November (2)
    • ►  October (1)
    • ►  July (2)
    • ►  May (3)
    • ►  March (1)
    • ►  January (2)
  • ►  2012 (20)
    • ►  December (1)
    • ►  November (3)
    • ►  October (3)
    • ►  September (1)
    • ►  July (1)
    • ►  May (3)
    • ►  April (2)
    • ►  March (4)
    • ►  February (2)
  • ►  2011 (17)
    • ►  November (5)
    • ►  October (1)
    • ►  September (1)
    • ►  August (2)
    • ►  July (1)
    • ►  June (1)
    • ►  May (1)
    • ►  April (1)
    • ►  March (1)
    • ►  February (2)
    • ►  January (1)
  • ▼  2010 (48)
    • ►  November (2)
    • ►  October (2)
    • ►  September (4)
    • ►  August (1)
    • ▼  July (13)
      • BlackHat USA 2010: How to Turn ATMs Into Jackpotte...
      • TIW 2010: Jonathan McCune for Adrian Perrig on "So...
      • TIW 2010: Research Workshop Panel Discussion - Adr...
      • TIW 2010: Virgil Gligor Delivers "A Challenge for ...
      • CyLab Business Risks Forum: Cormac Herley - "Every...
      • CyLab Business Risks Forum: Ed Stroz - "Manipulati...
      • CyLab Business Risks Forum: Christoper Burgess - "...
      • CyLab Business Risks Forum: Erin Kenneally - "Info...
      • CyLab Business Risks Forum: Richard Power - "Start...
      • CyLab Business Risks Forum: Jennifer Bayuk - "Ente...
      • CyLab Business Risks Forum: Rebecca Herold - Conve...
      • CyLab Business Risks Forum: Mike Susong - Electron...
      • SOUPS 2010: Insight into Usable Privacy & Security...
    • ►  June (6)
    • ►  May (5)
    • ►  April (1)
    • ►  March (7)
    • ►  February (2)
    • ►  January (5)
  • ►  2009 (73)
    • ►  December (1)
    • ►  November (3)
    • ►  October (1)
    • ►  September (2)
    • ►  August (4)
    • ►  July (8)
    • ►  June (8)
    • ►  May (6)
    • ►  April (19)
    • ►  March (10)
    • ►  February (11)

CyBlog Suggested Resources

  • Bob Sullivan, Red Tape Chronicles
  • Crypto-Gram
  • CSO Magazine
  • Information Security Magazine (SearchSecurity.com)
  • Insecurity Complex (Elinor Mills, CNET(
  • Krebs on Security (Brian Krebs)
  • CERT Podcast Series w/ Julia Allen
  • Rational Survivability (Christopher Hoff)
  • Rebecca Herold
  • SANS Newsbites
  • SC Magazine
  • Schneier on Security
  • Wall Street Journal Digits Blog
Simple theme. Powered by Blogger.