header photo


Trust 2011 Proceedings will be published in Springer in the LNCS series. 2011 Proceedings are now available online.

Papers published and presented at previous Trust conferences:

Trust 2010 - Accepted Papers

Technical Strand

  • SBAP:Software-Based Attestation for Peripherals
    Yanlin Li and Jonathan M. McCune and Adrian Perrig (CyLab, Carnegie Mellon University)

  • Robust Combiners for Software Hardening - Extended Abstract (Short Paper)
    Amir Herzberg and Haya Shulman (Bar Ilan University)

  • Engineering Attestable Services (Short Paper)
    John Lyle and Andrew Martin (Oxford University Computing Laboratory)

  • A DAA Scheme Using Batch Proof and Verification
    Liqun Chen (HP Labs)

  • Introducing the Trusted Virtual Environment Module (TVEM): A New Mechanism for Rooting Trust in Cloud Computing
    F. John Krautheim and Dhananjay S. Phatak and Alan T. Sherman (UMBC)

  • A Pairing-Based DAA Scheme Further Reducing TPM Resources
    Ernie Brickell and Jiangtao Li (Intel Corporation)

  • An Anonymous Attestation Scheme with Optional Traceability
    Jiangtao Li and Anand Rajan (Intel Corporation)

  • Beyond Kernel-level Integrity Measurement: Enabling Remote Attestation for the Android Platform
    Mohammad Nauman and Sohail Khan and Xinwen Zhang and Jean-Pierre Seifert (Institute of Management Sciences Pakistan and Samsung Information Systems America, USA and Technische Universität Berlin & Deutsche Telekom Laboratories)

  • Dynamic Enforcement of Platform Integrity (Short Paper)
    Martin Pirker and Ronald Toegl and Michael Gissing (Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Austria)

  • An Improved Memory Integrity Protection Scheme (Short Paper)
    Yin Hu and Berk Sunar (ECE Department, WPI)

  • Group-Based Attestation: Enhancing Privacy and Management in Remote Attestation
    Sami Alsouri and Oezguer Dagdelen and Stefan Katzenbeisser (TU Darmstadt)

  • The PUF Promise (Short Paper)
    Heike Busch and Miroslava Sotakova and and Stefan Katzenbeisser and Radu Sion (TU Darmstadt and Stony Brook University)

  • Requirements for an Integrity-Protected Hypervisor on the x86 Hardware Virtualized Architecture
    Amit Vasudevan and Jonathan M. McCune and Ning Qu and Leendert van Doorn and Adrian Perrig (CyLab/CMU and Nvidia Corp. and AMD)

  • Key Attestation from Trusted Execution Environments
    Kari Kostiainen and Alexandra Dmitrienko and Jan-Erik Ekberg and Ahmad-Reza Sadeghi and N. Asokan (Nokia Research Center Helsinki, Finland and Ruhr-University Bochum, Germany)

  • Lagrangian E-Voting: Verifiability on Demand and Strong Privacy
    Lukasz Krzywiecki and Miroslaw Kutylowski (Wroclaw University of Technology)

  • Application of Trusted Computing in Automation to Prevent Product Piracy
    Nora Lieberknecht (Research Center for Information Technology, Embedded Systems and Sensors Engineering (ESS))

  • Anonymous Authentication with TLS and DAA
    Emanuele Cesena and Hans Loehr and Gianluca Ramunno and Ahmad-Reza Sadeghi and Davide Vernizzi (Politecnico di Torino, Italy; Ruhr-University Bochum, Germany)

  • Towards A Trusted Mobile Desktop
    Marcel Selhorst and Christian Stüble and Utz Gnaida and Florian Feldmann (Sirrix AG and Federal Office for Information Security (BSI), Germany)

  • Escrowed Data and the Digital Envelope (Short Paper)
    King Ables and Mark D. Ryan (University of Birmingham, UK)

  • microTSS - A Simplified Trusted Software Stack
    Christian Stüble and Anoosheh Zaerin (Sirrix AG)

  • SegSlice: Towards a New Class of Secure Programming Primitives for Trustworthy Platforms
    Sergey Bratus and Michael E. Locasto and Brian Schulte (Dartmouth College and George Mason University)

Socio-Economic Strand

  • Can Competitive Insurers improve Network Security?
    Nikhil Shetty and Galina Schwartz and Jean Walrand (EECS, UC Berkeley)

  • The Leap of Faith from Online to Offline: An exploratory study of Couchsurfing.org
    Jun-E Tan (Nanyang Technological University, Singapore)

  • Axiomatic and Behavioural Trust
    Clark Thomborson (University of Auckland)

  • The Role of Soft Information in Trust Building: Evidence from Online Social Lending
    Stefanie Pötzsch and Rainer Böhme (TU Dresden and International Computer Science Institute Berkeley)

  • Nudge: Intermediaries' Role in Interdependent Network Security
    Jens Grossklags and Svetlana Radosavac and Alvaro Cardenas and John Chuang (Princeton University, DoCoMo USA Labs, Fujitsu Laboratories of America, University of California at Berkeley)

  • Ignore These At Your Peril: Ten principles for trust design
    Jens Riegelsberger and M. Angela Sasse (Google Research UK and University College London UK)

  • How the Public Views Strategies Designed to Reduce the Threat of Botnets
    Brent Rowe and Dallas Wood and Douglas Reeves (RTI International and NC State University)

  • Privacy Requirements Engineering for Trustworthy e-government Services
    Nikos Vrakas and Christos Kalloniatis and Aggeliki Tsohou and Costas Lambrinoudakis

  • Software on the witness stand: what should it take for us to trust it?
    Sergey Bratus and Ashlyn Lembree and Anna Shubina (Dartmouth, Franklin Pierce, Dartmouth)

Trust 2009

Trust 2008


See Springer website for online version of proceedings.