Research and Implementation of a Trusted Removable USB Flash Device

Article Preview

Abstract:

In this paper we present the research and implementation of TRFD, a Trusted Removable USB Flash Device which can resist various attacks. TRFD is an independent system which would authenticate the user and host before data access. All the data secure processing of TRFD, such as encrypting, signing, are performed inside the device, so TRFD can protect the data against host hacking. The evaluation of our prototype shows that TRFD can solve some security issues of removable storages indeed.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

604-609

Citation:

Online since:

September 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Computer Security Institute: 14th Annual CSI Computer Crime and Security Survey Executive Summary. http: /www. gocsi. com. (2009).

Google Scholar

[2] Mesabi Group: Storage Needs To Be Trusted Everywhere. http: /www. trustedcomputinggroup. org/files/resource_files/967C0F97-1D09-3519-AD0158A75489B26F/TCG_Commentary_Final. pdf. (2007).

Google Scholar

[3] Storage Networking Industry Association: Storage Security Best Current Practices. http: /www. trustedcomputinggroup. org/files/resource_files/145E13C1-1D09-3519-AD76E79C842CE323/SNIATechnicalProposal-Security-BCPs%2020080904. pdf. (2008).

Google Scholar

[4] Trusted Computing Group: TCG Specification Architecture Overview. http: /www. trustedcomputinggroup. org/files/resource_files/AC652DE1-1D09-3519-ADA026A0C05CFAC2/TCG_1_4_Architecture_Overview. pdf. (2007).

Google Scholar

[5] Trusted Computing Group: TCG Storage Architecture Core Specification. http: /www. trustedcomputinggroup. org/files/static_page_files/B6811067-1D09-3519-ADDAFC18E3A87CB2/Storage_Architecture_Core_Spec_v2_r1-Final. pdf. (2009).

Google Scholar

[6] V. Yodaiken: The RTLinux Manifesto, in Proceeding of The 5th Linux Expo. (1999).

Google Scholar

[7] B. Gassend, G. E. Suh, D. Clarke, M. van Dijk and S. Devadas: Caches and Hash Trees for Efficient Memory Integrity Verification, in Proceedings of the 9th International Symposium on High-Performance Computer Architecture. (2003).

DOI: 10.1109/hpca.2003.1183547

Google Scholar

[8] J.C. Ren: Research and Implementation of Key Techniques on Trusted Security-enhanced Method for System, unpublished. (2006).

Google Scholar