IBM Japan
Skip to main content
 
     Home  |  Products & services  |  Support & downloads  |  My account
 Select a country
 IBM Research home
Tokyo Research Lab
Workshop Home
 ·Call For Papers
 ·Submission
 ·Registration
 ·Accepted Papers
 ·Program
 ·Location
About 1st WATC
 
 
 


IBM Research

The Second Workshop on Advances in Trusted Computing (WATC '06 Fall)

November 30 - December 1, 2006
Ivy Hall Aogaku Kaikan, Tokyo, Japan
Sponsored by the Japanese Ministry of Economy, Trade and Industry (METI)


Invited Talks

  • Mr. Ned M. Smith
    Staff Security Architect - Intel Digital Office Platforms
    Co-Chair Infrastructure Working Group in the Trusted Computing Group

    Title: "The Role of Integrity Management Infrastructure in support of Proactive Security" (presentation)
    Abstract: Today's security mechanisms can be classified as reactive measures aimed at improving response time and efficiency when recovering from security mishap. Nevertheless, security incident rates continue to increase exponentially. A fundamentally different approach to security is required; one that applies proactive techniques to prevent malware from ever executing. Integrity management infrastructure seeks to make it easy to recognize known good code from suspect code and to verify platform configurations are within acceptable standards. Verification during system boot and at network connect are effective points where integrity checks can be enforced. The TCG IWG Integrity Manifest Schemas can be used to aid automated evaluation of platform configurations.

    Biography: Ned's security background includes Trusted System development based on Trusted Computing Security Evaluation Criteria (TCSEC), firewall design, Common Data Security Architecture (CDSA) and cryptographic interface design, SSL/TLS and PKI. He established the Trusted Network Connect subgroup of the IWG and helped define TNC architecture and specifications. His recent work at Intel includes definition of Intel vPro platform security and Safer Computing architecture. He holds a Master of Science (MS) degree in computer science.


  • Professor Ahmad-Reza Sadeghi (Ruhr University Bochum, Germany)

    Title: "Trusting Trust - The Need and Challenges for Trusted Computing"
    Abstract: Trusted Computing (TC) is an emerging technology. Multiple prominent international research and industrial projects have started to investigate trustworthy computing platforms and distributed applications with mutually assured trust properties based on TC. These efforts have yielded first promising results. Nevertheless, a number of challenging problems remain that have to be addressed before Trusted Computing can be rolled out on a large scale and in security critical contexts. These problems are not just of technical nature, but also have social, economical and political flavors. From a research perspective, this makes the Trusted Computing a subject that is both complex and appealing.
    Although the instantiation of Trusted Computing by the Trusted Computing Group (TCG) happened several years ago and has been subjected to an extensive public debates, there is still surprisingly limited understanding of this technology and its opportunities, in particular among decision makers.
    The main purpose of this talk is to give an insight into the experience we have gained and the research activities on national and European basis. We want to share and discuss some ideas, challenges and work in progress with the attendees in particular the trust in TPM, its compliance and flexible implementation, and options of realizing more abstract functionalities based on these implementations.

    Biography: Ahmad-Reza Sadeghi is a Professor at Horst Goertz Institute for IT Security at Bochum University in Germany. Prior to academia he has been with R&D Departments of IT enterprises, such as Ericsson Telecommunications, for several years.
    Currently, he is leading several national and international research and development projects on design and implementation of Trustworthy Computing Platforms based on Trusted Computing technology. His research interests include Trusted Computing, design of cryptographic protocols, fingerprinting, and privacy enhancing technologies.
    Ahmad has MSc in Electrical Engineering as well as in Mechanical Engineering. He received his PhD in Computer Science on privacy protecting cryptographic systems from Saarland University in Saarbrucken, Germany.

  • Mr. Ronald Perez
    Senior Technical Staff Member at the IBM T. J. Watson Research Center

    Title: "Virtualization and the Trusted Platform Module" (presentation)
    Abstract: Virtualization technologies are increasingly being employed in an effort to increase the utilization of physical computing resources and to simplify many systems management tasks. This combination will result in a reduced total cost of ownership and an accelerated increase in the number of virtual systems. While the isolation properties offered by virtualization have the potential to improve system security, trusted computing technologies also promise to play an increasingly important role in this regard. I will discuss this role and our efforts to virtualize the Trusted Platform Module, as well as the unique security-related challenges posed by virtulized environments.

    Biography: Ronald Perez is a Senior Technical Staff Member at the IBM T. J. Watson Research Center where he currently manages the Secure Systems Department, a team of computer scientists and engineers pursuing technologies that enhance computer platform security in distributed heterogeneous environments. His research interests include operating systems as well as secure hardware and embedded subsystems. His current focus is the advancement of emerging trusted computing and hardware-based virtualization technologies to achieve strong platform security guarantees. Prior to joining IBM Research in 1997, he spent several years developing aspects of fault tolerant systems at Tandem Computers, and ten years with Motorola in a number of areas related to systems software and single board computers. Ronald received his degree in Computer Science from The University of Texas at Austin.

Preliminary Program (as of November 16)

* : short presentation (15min)
Day 1 (November 30)
10:00-10:30 Opening Remarks
10:30-11:30 Invited Talk : Ned M. Smith (Intel)
"The Role of Integrity Management Infrastructure in support of Proactive Security"
11:30-13:00 Lunch
13:00-14:45 Session 1: Integrity Protection and Verification       Chair: Christian Stueble (Ruhr-University Bochum)
  • Flexible Integrity Protection and Verification Architecture for Virtual Machine Monitors (paper, presentation)
    Bernhard Jansen, HariGovind V. Ramasamy, and Matthias Schunter (IBM Zurich Research Laboratory, Switzerland)
  • Practical Integrity Measurement and Remote Verification for Linux Platform * (paper, presentation)
    Seiji Munetoh (IBM Tokyo Research Laboratory, Japan)
  • A robust Integrity Reporting Protocol for Remote Attestation (paper, presentation)
    Frederic Stumpf, Omid Tafreschi, Patrick Roeder, Claudia Eckert (Darmstadt University of Technology, Germany)
  • Thin Clean Client for an Instant Trusted Environment
    Megumi Nakamura, Seiji Munetoh (IBM Tokyo Research Laboratory, IBM Japan)
14:45-15:15 Coffee Break
15:15-16:30 Session 2: DRM and Privacy       Chair: Hiroaki Kikuchi (Tokai University)
  • Hades - Hardware Assisted Document Security (paper, presentation)
    Patrick Roder, Frederic Stumpf, Ralf Grewe, Claudia Eckert (Darmstadt University of Technology, Germany)
  • Play it once again, Sam - Enforcing Stateful Licenses on Open Platforms (paper, presentation)
    Ahmad-Reza Sadeghi (Horst-Goertz-Institute for IT-Security, Ruhr-University Bochum, Germany), Michael Scheibel (Sirrix AG Security Technologies, Bochum, Germany), Christian Stueble, Marko Wolf (Horst-Goertz-Institute for IT-Security, Ruhr-University Bochum, Germany)
  • Anonymous IP-Address Blocking in Tor with Trusted Computing * (paper)
    Patrick Tsang, Apu Kapadia, Sean W. Smith (Dartmouth College, US)
16:40-17:30 Business Meeting
Day 2 (December 1)
9:15-10:00 Session 3: TPM/TNC        Chair: Sachiko Yoshihama (IBM Tokyo Research Laboratory)
  • Trusted Web Service *
    Zhexuan Song, Sung Lee, Ryusuke Masuoka (Fujitsu Laboratories of America, US)
  • A Mobile Trusted Platform Module (mTPM) Architecture *
    Jesus Molina, Houcheng Lee, Sung Lee, Zhexuan Song (Fujitsu Laboratories of America, US)
  • Faerieplay on Tiny Trusted Third Parties * (paper)
    Alexander Iliev Sean Smith (Dartmouth College, US)
10:00-10:15 Coffee Break
10:15-11:30 Session 4: Grid and Trusted Domain        Chair: Apu Kapadia (Dartmouth College)
  • Enhancing Grid Security Using Trusted Virtualization (paper, presentation)
    Hans Lohr (Ruhr-Universitat Bochum), HariGovind V. Ramasamy (IBM Zurich Research Laboratory), Ahmad-Reza Sadeghi (Ruhr-Universitat Bochum), Matthias Schunter (IBM Zurich Research Laboratory), Christian Stuble (Ruhr-Universitat Bochum, Germany)
  • Trusted Delegation for Grid Computing (presentation)
    Andrew Cooper, Andrew Martin (Oxford University Computing Laboratory, UK)
  • Towards Multi Layer Trusted Virtual Domains * (paper, presentation)
    Yasuharu Katsuno, Michiharu Kudo, Yuji Watanabe, Sachiko Yoshihama (IBM Tokyo Research Laboratory, Japan) Ronald Perez, Reiner Sailer, Leendert van Doorn (IBM T. J. Watson Research Center, US)
11:30-13:00 Lunch
13:00-14:00 Invited Talk : Ahmad-Reza Sadeghi (Ruhr University Bochum, Germany)
"Trusting Trust - The Need and Challenges for Trusted Computing"
14:00-15:00 Invited Talk : Ronald Perez (IBM)
"Virtualization and the Trusted Platform Module"
15:00-15:30 Coffee Break
15:30-:16:30 Panel Discussion (chart)       Moderator: Sachiko Yoshihama (IBM Tokyo Research Laboratory)
  • Hisanori Mishima (Hitachi, Japan)
  • Ronald Perez (IBM, USA)
  • Ahmad-Reza Sadeghi (Ruhr University Bochum, Germany)
  • Ned M. Smith (Intel, USA)
  • Shuichi Tashiro (IPA, Japan)
16:30-17:00 Closing Remark
  
 
  About IBM  |  Privacy  |  Terms of use  |  Contact