Ronald Toegl

Ronald Toegl
Infineon Technologies · Chip Card & Security (CCS)

PhD

About

34
Publications
2,165
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
253
Citations
Citations since 2016
3 Research Items
70 Citations
2016201720182019202020212022051015
2016201720182019202020212022051015
2016201720182019202020212022051015
2016201720182019202020212022051015
Additional affiliations
April 2007 - September 2014
Graz University of Technology
Position
  • Senior Researcher
December 2006 - April 2007
Virtual Vehicle
Position
  • Researcher
October 2005 - March 2006
German Aerospace Center (DLR)
Position
  • Master's Student

Publications

Publications (34)
Article
The paradigm of Trusted Computing promises a new approach to improve the security of embedded and mobile systems. The core functionality, based on a hardware component known as Trusted Platform Module (TPM), is widely available. However, integration and application in embedded systems remains limited at present, simply because of the extremely stee...
Conference Paper
Full-text available
Even competent programmers make mistakes. Automatic verification can detect errors, but leaves the frustrating task of finding the erroneous line of code to the user. This paper presents an automatic approach for identifying potential error locations in software. It is based on a deductive verification engine, which detects errors in functions anno...
Article
Full-text available
The cloud offers clear benefits for computations as well as for storage for diverse application areas. Security concerns are by far the greatest barriers to the wider uptake of cloud computing, particularly for privacy-sensitive applications. The aim of this article is to propose an approach for establishing trust between users and providers of clo...
Conference Paper
A critical requirement in overlay networks is to have unique, undeniable and verifiable identifiers for each node in the system.Without them, every node in such an overlay network would be able to impersonate other nodes or create an arbitrary amount of bogus nodes. Thus, a node or a group of nodes, could easily gain control over an overlay network...
Article
Mobile devices have become powerful and user-friendly. At the same time they have become a hosting platform for a wide variety of services. Naturally, the interests of the various stakeholders on a mobile platform are not the same. Thus, there is demand for a strict separation model of services on mobile devices. In this paper, we outline a possibl...
Conference Paper
Cryptographic key material needs to be protected. Currently, this is achieved by either pure software based solutions or by more expensive dedicated hardware security modules. We present a practical architecture to project the security provided by the Trusted Platform Module and Intel Trusted eXecution Technology on a virtual security module. Our a...
Conference Paper
Supporting emergency responders with mobile software agents promise increasing the efficiency of crisis management. While mobile agents offer many advantages, they also pose new challenges to security. However, security is a key prerequisite in crisis situations. A main security requirement is to create an agent execution environment that will not...
Article
The paradigm of Trusted Computing promises a new approach to improve the security of computer systems. The core functionality, based on a hardware component known as Trusted Platform Module, is integrated into commodity hardware. However, operating system integration and application software support remains limited at present. In particular, for Ja...
Conference Paper
Moving local services into a network of Cloud nodes raises security concerns as this affects control over data and code execution. The Trusted Platform Module can help detect Cloud nodes running unknown software configurations. To achieve this, we propose a node join protocol that enforces remote attestation. We prototype our approach on both curre...
Article
Full-text available
Modern communication and computing devices have the potential to increase the efficiency of disaster response. Mobile agents and seamless push-to-talk communication embody decentralised and flexible technologies to leverage this potential. While mobile agent platforms are facing greater variety of security risks compared to a classical client-serve...
Conference Paper
ARM TrustZone is a hardware isolation mechanism to improve software security. Despite its widespread availability in mobile and embedded devices, development of software for it has been hampered by a lack of openly available emulation and development frameworks. In this paper we provide a comprehensive open-source software environment for experimen...
Conference Paper
The distributed software paradigms of grid and cloud computing offer massive computational power at commodity prices. Unfortunately, a number of security risks exist. In this paper we propose a software architecture which leverages the Trusted Computing principle of Remote Attestation to assess the trustworthiness of nodes in computing clouds. We c...
Conference Paper
The security of virtualization platforms can be improved by applying trusted computing mechanisms such as enforcing the integrity of the hypervisor. In this paper we build on a recently proposed platform that extends this trust on to applications and services. We describe a process that covers the fully integrity-enforcing life-cycle of a trusted v...
Article
Remote Attestation, as devised by the Trusted Computing Group, is based on a secure hardware component—the Trusted Platform Module (TPM). It allows to reach trust decisions between different network hosts. However, attestation cannot be applied in an important field of application—the identification of physically encountered, public computer platfo...
Conference Paper
Modern PC platforms offer hardware-based virtualization and advanced Trusted Computing mechanisms. Hardware primitives allow the measuring and reporting of software configurations, the separation of application execution environments into isolated partitions and the dynamic switch into a trusted CPU mode. In this paper we present a practical system...
Conference Paper
Full-text available
Near Field Communication (NFC) has become widely available on smart phones. It helps users to intuitively establish communication between local devices. Accessing devices such as public terminals raises several security concerns in terms of confidentiality and trust. To overcome this issue, NFC can be used to leverage the trusted-computing protocol...
Conference Paper
Modern communication and computing devices have the potential to increase the efficiency of disaster response. Mobile agents and ad hoc networks are decentralized and flexible technologies to leverage this potential. While both ad hoc networks and mobile agent platforms suffer from a greater variety of security risks than the classic client-server...
Article
The advances and adoption of Trusted Computing and hardware assisted virtualisation technologies in standard PC platforms promise new approaches in building a robust virtualisation platform for security sensitive software modules. The amalgam of these technologies allows an attractive off-the-shelf environment, capable of supporting security levels...
Conference Paper
Modern Trusted Computing platforms offer the basic hardware building blocks to allow effective enforcement of software integrity. In this paper we present a practical software system architecture which uses Intel’s late launch mechanism to boot a known-good configuration. We restrict the access to data and execution of services to trusted platform...
Conference Paper
Full-text available
Modern communication and computing devices have the potential to increase the efficiency of disaster response. Mobile agents are a decentralized and flexible technology to leverage this potential. While mobile agent platforms suffer from a greater variety of security risks than the classic client-server approach, Trusted Computing is capable of all...
Conference Paper
Public kiosk computers are especially exposed and the software running on them usually cannot be assumed to be unaltered and secure. The Trusted Platform Module (TPM) as a root of trust in an otherwise untrusted computer allows a machine to report the integrity and the configuration of a platform to a remote host on the Internet. A natural usage sc...
Conference Paper
Trusted Computing (TC) as envisioned by the Trusted Computing Group promises a solution to the problem of establishing a trust relationship between otherwise unrelated platforms. In order to achieve this goal the platform has to be equipped with a Trusted Platform Module (TPM), which is true for millions of contemporary personal computers. The TPM...
Conference Paper
Full-text available
Software independence from hardware platforms is an important feature of growing significance, given the emergence of new distributed computing paradigms. It would be desirable to extend the Trusted Computing mechanisms offered by the Trusted Platform Module into the platform independent Java environment. However, there is currently no generally ac...
Chapter
Trusted Computing is a promising approach to improve the security of computer systems. However, current releases of the Java platform do not provide support to utilize the Trusted Platform Module (TPM). This paper presents several building-blocks that lead to the integration of TC into Java. It outlines the issues that arise with multiple TPM-virtu...
Conference Paper
Trusted computing introduces the Trusted Platform Module (TPM) as a root of trust on an otherwise untrusted computer. The TPM can be used to restrict the use of cryptographic keys to trusted states, i.e., to situations in which the computer runs trusted software. This allows for the distribution of intellectual property or secrets to a remote party...
Conference Paper
The concept of Trusted Computing (TC) promises a new approach to improve the security of computer systems. The core functionality, based on a hardware component known as Trusted Platform Module (TPM), is integrated into commonly available hardware. Still, only limited software support exists, especially in the context of grid computing. This paper...
Conference Paper
Full-text available
Over the past years, many dierent approaches and con- cepts in order to increase computer security have been presented. One of the most promising of these concepts is Trusted Computing which of- fers various services and functionalities like reporting and verifying the integrity and the conguration of a platform (attestation). The idea of reporting...
Conference Paper
This paper deals with the design, evaluation and performance comparison of smart framing strategies that complement the packet scheduler in DVB-S2 systems with Adaptive Coding and Modulation, when QoS guarantees are to be provided. User data packets are transmitted grouped in frames according to a scheduling algorithm. Each of these frames uses a s...
Conference Paper
This paper deals with the design, evaluation and comparison of smart framing strategies that complement the packet scheduler in DVB-S2 systems with Adaptive Coding and Modulation. Provided that user data packets are transmitted grouped in frames, each of them using a modulation and coding setting (ModCod), the inherent spectral efficiency of the se...
Conference Paper
IP telephony is one of the fastest growing technologies. It is based on the TCP/IP protocol suite. However to provide the same services and service qualities like legacy telephony networks, special care has to be taken for the IP network design. The TCP/IP protocol suite is also increasingly used for satellite communications, which offers wide-area...

Network

Cited By

Projects

Project (1)
Project
Life-long passion. The best cryptographers are maliciously devious attackers. This is not about any specific funded project for a finite time period but is meant to capture the research direction of cryptanalysis & list relevant publications herein