Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where John Marchesini is active.

Publication


Featured researches published by John Marchesini.


annual computer security applications conference | 2004

Open-source applications of TCPA hardware

John Marchesini; Sean W. Smith; Omen Wild; Joshua Stabiner; Alex Barsamian

How can Alice trust computation occurring at Bobs computer? Since it exists and is becoming ubiquitous, the current-generation TCPA/TCG hardware might enable a solution. When we started investigating this technology, the specification of the TCG software stack was not publicly available, and an implementation is still not; so, we designed and built an open-source platform based on Linux and commercially available TCPA/TCG hardware which would allow us to address the problem of trusting computation. Within the limits of TCPA/TCG hardware security, our solution balances what Alice needs to do to make trust judgments against what Bob needs to do to keep his system running. Furthermore, we describe how we use our platform to harden three sample open-source applications: Apache SSL Web servers, OpenCA certification authorities, and (with SELinux) compartmented attestation to balance privacy with DRM. To our knowledge, our project remains the only open-source TCPA/TCG platform in existence, and is also enabling trusted computing applications developed by our user community (enforcer.sourceforge.net reports over 1100 sourcecode downloads so far).


Computers & Security | 2005

Keyjacking: the surprising insecurity of client-side SSL

John Marchesini; Sean W. Smith; Meiyuan Zhao

In theory, PKI can provide a flexible and strong way to authenticate users in distributed information systems. In practice, much is being invested in realizing this vision via client-side SSL and various client keystores. However, whether this works depends on whether what the machines do with the private keys matches what the humans think they do: whether a server operator can conclude from an SSL request authenticated with a users private key that the user was aware of and approved that request. Exploring this vision, we demonstrate via a series of experiments that this assumption does not hold with standard desktop tools, even if the browser user does all the right things. A fundamental rethinking of the trust, usage, and storage model might result in more effective tools for achieving the PKI vision.


european public key infrastructure workshop | 2005

Modeling public key infrastructures in the real world

John Marchesini; Sean W. Smith

PKIs are complex distributed systems that are responsible for giving users enough information to make reasonable trust judgments about one another. Since the currencies of PKI are trust and certificates, users who make trust decisions (often called relying parties) must do so using only some initial trust beliefs about the PKI and some pile of certificates (and other assertions) they received from the PKI. Given a certificate, a relying party needs to conclude that the keyholder described by the certificate actually possesses the properties described by the certificate. In this paper, we present a calculus that allows relying parties to make such trust judgements. Our calculus extends Maurers deterministic model, and is focused on real world issues such as time, revocation, delegation, and heterogeneous certificate formats. We then demonstrate how our calculus can be used to reason about numerous situations that arise in practice.


International Journal of Information Security | 2006

Distributing security-mediated PKI

Gabriel Vanrenen; Sean W. Smith; John Marchesini

The security-mediated approach to PKI offers several advantages, such as instant revocation and compatibility with standard RSA tools. In this paper, we present a design and prototype that addresses its trust and scalability problems. We use trusted computing platforms linked with peer-to-peer networks to create a network of trustworthy mediators and improve availability. We use threshold cryptography to build a back-up and migration technique which allows recovery from a mediator crashing while also avoiding having all mediators share all secrets. We then use strong forward secrecy with this migration, to mitigate the damage should a crashed mediator actually be compromised.


international conference on computational science | 2005

The dartmouth green grid

James E. Dobson; Jeffrey B. Woodward; Susan A. Schwarz; John Marchesini; Hany Farid; Sean W. Smith

The Green Grid is an ambitious project to create a shared high performance computing infrastructure for science and engineering at Dartmouth College. The Green Grid was created with the support of the Dean of the Faculty of Arts & Sciences to promote collaborative computing for the entire Dartmouth community. We will share our design for building campus grids and experiences in Grid-enabling applications from several academic departments.


Archive | 2003

Experimenting with TCPA/TCG Hardware, Or: How I Learned to Stop Worrying and Love The Bear

John Marchesini; Sean W. Smith; Omen Wild; Rich MacDonald


Archive | 2003

Bear: An Open-Source Virtual Secure Coprocessor based on TCPA

Rich MacDonald; Sean W. Smith; John Marchesini; Omen Wild


Archive | 2007

The Craft of System Security

Sean W. Smith; John Marchesini


Archive | 2004

Greenpass: Decentralized, PKI-based Authorization for Wireless LANs

Nicholas C. Goffee; Sung Hoon Kim; Sean W. Smith; Punch Taylor; Meiyuan Zhao; John Marchesini


Archive | 2002

Virtual Hierarchies - An Architecture for Building and Maintaining Efficient and Resilient Trust Chains

John Marchesini; Sean W. Smith

Collaboration


Dive into the John Marchesini's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Bennet Yee

University of California

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge