Skip to main content
  • Conference proceedings
  • © 2011

Trust and Trustworthy Computing

4th International Conference, TRUST 2011, Pittsburgh, PA, USA, June 22-24, 2011, Proceedings

  • up-to-date results
  • fast track conference proceedings
  • state-of-the-art report

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6740)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): Trust: International Conference on Trust and Trustworthy Computing

Conference proceedings info: Trust 2011.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (23 papers)

  1. Front Matter

  2. Session 1: Cloud and Virtualization

    1. Verifying Trustworthiness of Virtual Appliances in Collaborative Environments

      • Cornelius Namiluko, Jun Ho Huh, Andrew Martin
      Pages 1-15
  3. Session 2: Physically Unclonable Functions

    1. Side-Channel Analysis of PUFs and Fuzzy Extractors

      • Dominik Merli, Dieter Schuster, Frederic Stumpf, Georg Sigl
      Pages 33-47
    2. Coalition Resistant Anonymous Broadcast Encryption Scheme Based on PUF

      • Łukasz Krzywiecki, Mirosław Kutyłowski
      Pages 48-62
    3. A Practical Device Authentication Scheme Using SRAM PUFs

      • Patrick Koeberl, Jiangtao Li, Anand Rajan, Claire Vishik, Wei Wu
      Pages 63-77
  4. Session 3: Mobile Device Security

    1. Practical Property-Based Attestation on Mobile Devices

      • Kari Kostiainen, N. Asokan, Jan-Erik Ekberg
      Pages 78-92
    2. Taming Information-Stealing Smartphone Applications (on Android)

      • Yajin Zhou, Xinwen Zhang, Xuxian Jiang, Vincent W. Freeh
      Pages 93-107
    3. Towards Permission-Based Attestation for the Android Platform

      • Ingo Bente, Gabi Dreo, Bastian Hellmann, Stephan Heuser, Joerg Vieweg, Josef von Helden et al.
      Pages 108-115
  5. Session 4: Socio-Economic Aspects of Trust

    1. Trusting to Learn: Trust and Privacy Issues in Serious Games

      • Miguel Malheiros, Charlene Jennett, Will Seager, M. Angela Sasse
      Pages 116-130
    2. Modifying Trust Dynamics through Cooperation and Defection in Evolving Social Networks

      • Luca Allodi, Luca Chiodi, Marco Cremonini
      Pages 131-145
  6. Session 5: Hardware Trust

    1. Systematic Security Assessment at an Early Processor Design Stage

      • Ruirui Huang, David Grawrock, David C. Doughty, G. Edward Suh
      Pages 154-171
    2. CPU Support for Secure Executables

      • Peter Williams, Rick Boivie
      Pages 172-187
    3. Extracting Device Fingerprints from Flash Memory by Exploiting Physical Variations

      • Pravin Prabhu, Ameen Akel, Laura M. Grupp, Wing-Kei S. Yu, G. Edward Suh, Edwin Kan et al.
      Pages 188-201
  7. Session 6: Access Control

    1. Home-Network Threats and Access Controls

      • Mark Baugher, Victor Lortz
      Pages 217-230
    2. Contego: Capability-Based Access Control for Web Browsers

      • Tongbo Luo, Wenliang Du
      Pages 231-238
  8. Session 7: Privacy

    1. Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information

      • Emiliano De Cristofaro, Yanbin Lu, Gene Tsudik
      Pages 239-253
    2. CertainLogic: A Logic for Modeling Trust and Uncertainty

      • Sebastian Ries, Sheikh Mahbub Habib, Max Mühlhäuser, Vijay Varadharajan
      Pages 254-261

Other Volumes

  1. Trust and Trustworthy Computing

About this book

This book constitutes the refereed proceedings of the 4th International Conference on Trust and Trustworthy Computing, TRUST 2011, held in Pittsburgh, PA, USA in June 2011.

The 23 revised full papers presented were carefully reviewed and selected for inclusion in the book. The papers are organized in technical sessions on cloud and virtualization, physically unclonable functions, mobile device security, socio-economic aspects of trust, hardware trust, access control, privacy, trust aspects of routing, and cryptophysical protocols.

Editors and Affiliations

  • Carnegie Mellon University, Pittsburgh, USA

    Jonathan M. McCune, Adrian Perrig

  • Hewlett-Packard Labs, Stoke Gifford, UK

    Boris Balacheff

  • TU Darmstadt / Fraunhofer SIT, Darmstadt, Germany

    Ahmad-Reza Sadeghi

  • University College London, London, UK

    Angela Sasse

  • Hewlett Packard Labs, Stoke Gifford, UK

    Yolanta Beres

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access