R E - T R U S T

Remote EnTrusting by RUn-time Software auThentication


Conference Calls
Next

2009-05-04 Mon at 16.00

Please call the number
+44 870 068 3300
(or 0844 484 3300 from UK) and insert the code provided by the coordinator through RE-TRUST mailing-list.


Next Meetings

2009-06-25/26 Thu/Fri
  Project Quarterly Meeting
  Torino - Italy

Previous Meetings

2009-03-19/20 Thu/Fri
  Project Quarterly Meeting
  Paris - France (link)
2008-12-15 Mon
  Project Quarterly Meeting
  Paris - France (link)
2008-10-17 Fri
  Second Year Review
  Trento - Italy
2008-10-15/16 Wed/Thu
  Workshhop RE-TRUST 2008
  Trento - Italy (link)
2008-06-19/20 Tue/Wed
  Project Quarterly Meeting
  St. Petersburg - Russia (link)
2008-03-11 Tue/Wed
  Project Quarterly Meeting
  Villach - Austria (link)
2007-12-18/19 Tue/Wed
  Project Quarterly Meeting
  Leuven - Belgium (link)
2007-09-25/26 Tue/Wed
  Plenary Workshop
  Trento - Italy (link)
2007-09-24 Tue/Wed
  First Year Review
  Trento - Italy (link)
2007-06-19/20 Tue/Wed
  Project Quarterly Meeting
  Torino - Italy (link)
2007-06-08 Fri
  RE-TRUST Architecture Meeting
  Paris - Meudon sur Seine - France
2007-03-20/21 Tue/Wed
  Project Quarterly Meeting
  Paris - France (link)
2006-12-19/20 Tue/Wed
  Project Quarterly Meeting
  Trento - Italy (link)
2006-10-16
  WP2 Meeting
  Torino - Italy
2006-10-04
  WP3 Meeting
  Paris - France
2006-09-18/19
  Kick-off Workshop
  Trento - Italy
Program - Photos


BSCW:
Secure Project Workspace
Tutorial (Click here)

Project Introduction

When the software industry discusses about software integrity, the main focus is on the protection of static software modules (e.g., by verifying the signature of their originator). In contrast, dynamic software authentication in real-time during execution is a known problem without a satisfactory solution. Specifically, how to ensure that a trusted code base (i.e., the software as was specified and implemented) is running on an untrusted machine at all times and that the original code functionality has not been modified prior to or during run-time, is an open research challenge.

This project will investigate both all-in-software and hardware-assisted novel methodologies in order to solve the problem mentioned above by employing a trusted logic component on an untrusted machine that in turn authenticates its operation continuously during run-time. The method assures a remote entrusting component so that if the authentication is successful, then the original software functionality is properly executed on the untrusted machine.

By providing a more software-based, cost-effective infrastructure to trust the RE-TRUST project will have a major impact on the security R&D landscape and potentially a major long-term impact on business and commercial applications, like e-commerce and e-government.

The RE-TRUST project aims at a providing a successful solution to the central issues of digital right management (DRM), data privacy in Grid computing, and protection of networks and servers. The realization of the proposed objective poses major scientific and engineering challenges of an interdisciplinary nature:

  1. SW engineering,
  2. cryptography,
  3. security protocols,
  4. operating systems,
  5. network protocols and
  6. smart cards. Thus, a high quality academic and industrial consortium has been assembled, accordingly.


















.