Boston Linux & Unix (BLU) Home | Calendar | Mail Lists | List Archives | Desktop SIG | Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings
Linux Cafe | Meeting Notes | Blog | Linux Links | Bling | About BLU

BLU Discuss list archive


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

FW: LCS/CIS Talk, OCT 18, TOMORROW



Thought I would pass this along in case anyone on the list might be
interested.

--Tim

-----Original Message-----
From: Be Blackburn [mailto:be at theory.lcs.mit.edu] 
Sent: Thursday, October 17, 2002 12:49
To: theory-seminars at theory.lcs.mit.edu
Cc: cis-seminars at theory.lcs.mit.edu
Subject: LCS/CIS Talk, OCT 18, TOMORROW


Open to the Public

Date:     Friday, Oct 18, 2002 
Time:     10:30 a.m.- 12:00 noon 
Place:    NOTE: NE43-518, 200 Tech Square 
Title:    Palladium
Speaker:  Brian LaMacchia, Microsoft Corp.
Hosts:    Ron Rivest and Hal Abelson

Abstract: 

This talk will present a technical overview of the Microsoft
"Palladium" Initiative.  The "Palladium" code name refers to a set of
hardware and software security features currently under development
for a future version of the Windows operating system.  "Palladium"
adds four categories of security services to today's PCs:

  a. Curtained memory. The ability to wall off and hide pages of main
memory so that each "Palladium" application can be assured that it is
not modified or observed by any other application or even the
operating system.

  b. Attestation. The ability for a piece of code to digitally sign
or otherwise attest to a piece of data and further assure the
signature recipient that the data was constructed by an unforgeable,
cryptographically identified software stack.

  c. Sealed storage. The ability to securely store information so
that a "Palladium" application or module can mandate that the
information be accessible only to itself or to a set of other trusted
components that can be identified in a cryptographically secure
manner.

  d. Secure input and output. A secure path from the keyboard and
mouse to "Palladium" applications, and a secure path from "Palladium"
applications to an identifiable region of the screen.

Together, these features provide a parallel execution environment to
the "traditional" kernel- and user-mode stacks.  The goal of
"Palladium" is to help protect software from software; that is, to
provide a set of features and services that a software application can
use to defend against malicious software also running on the machine
(viruses running in the main operating system, keyboard sniffers,
frame grabbers, etc).  "Palladium" is not designed to provide defenses
against hardware-based attacks that originate from someone in control
of the local machine.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/x-pkcs7-signature
Size: 3232 bytes
Desc: not available
URL: <http://lists.blu.org/pipermail/discuss/attachments/20021017/18ea28f5/attachment.bin>



BLU is a member of BostonUserGroups
BLU is a member of BostonUserGroups
We also thank MIT for the use of their facilities.

Valid HTML 4.01! Valid CSS!



Boston Linux & Unix / webmaster@blu.org