Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Vinay Phegade is active.

Publication


Featured researches published by Vinay Phegade.


hardware and architectural support for security and privacy | 2013

Using innovative instructions to create trustworthy software solutions

Matthew Hoekstra; Reshma Lal; Pradeep M. Pappachan; Vinay Phegade; Juan Del Cuvillo

Software developers face a number of challenges when creating applications that attempt to keep important data confidential. Even with diligent attention paid to correct software design and implementation practices, secrets can still be exposed through a single flaw in any of the privileged code on the platform, code which may have been written by thousands of developers from hundreds of organizations throughout the world. Intel is developing innovative security technology which provides the ability for software developers to maintain control of the security of sensitive code and data by creating trusted domains within applications to protect critical information during execution and at rest. This paper will describe how this technology has been effectively used in lab exercises to protect private information in applications including enterprise rights management, video chat, trusted financial transactions, and others. Examples will include both protection of local processing and the establishment of secure communication with cloud services. It will illustrate useful software design patterns that can be followed to create many additional types of trusted software solutions.


digital identity management | 2011

Client-based authentication technology: user-centric authentication using secure containers

Conor P. Cahill; Jason Martin; Matthew W. Pagano; Vinay Phegade; Anand Rajan

Todays authentication suffers from unsolved problems in security and usability. Adversaries have multiple attack vectors with which to steal user credentials, including phishing, malware, and attacks on service providers. Current security practices such as password-complexity policies and idle timeouts often compromise usability. We propose our solution, Client-Based Authentication Technology (CBAT), to simultaneously improve security and usability in authentication. The main component of CBAT is our Trusted Identity Manager (TIM), which resides within a hardware-based secure container on the users system. The TIM asserts the users authentication to local and remote service providers without releasing the users credentials. In addition, the TIM non-intrusively monitors the users physical presence and locks the system if the user leaves. We provide architectural and implementation details of CBAT in hopes of improving current methods of authentication.


trust and trustworthy computing | 2015

Time to Rethink: Trust Brokerage Using Trusted Execution Environments

Patrick Koeberl; Vinay Phegade; Anand Rajan; Thomas Schneider; Steffen Schulz; Maria Zhdanova

Mining and analysis of digital data has the potential to provide improved quality of life and offer even life-saving insights. However, loss of privacy or secret information would be detrimental to these goals and inhibit widespread application. Traditional data protection measures tend to result in the formation of data silos, severely limiting the scope and yield of “Big Data”. Technology such as privacy-preserving multi-party computation (MPC) and data de-identification can break these silos enabling privacy-preserving computation. However, currently available de-identification schemes tend to suffer from privacy/utility trade-offs, and MPC has found deployment only in niche applications.


Archive | 2011

Methods, systems and apparatus to facilitate client-based authentication

Conor P. Cahill; Vinay Phegade; Jason Martin; Anand Rajan; Nikhil M. Deshpande; Radia Perlman


Archive | 2013

Trusted data processing in the public cloud

Vinay Phegade; Nilesh K Jain; Jesse Walker


Archive | 2013

Mutually assured data sharing between distrusting parties in a network environment

Vinay Phegade; Anand Rajan; Simon P. Johnson; Vincent R. Scarlata; Carlos V. Rozas; Nikhil M. Deshpande


Archive | 2012

Secure local web application data manager

Hong C. Li; Mark D. Boucher; Conor P. Cahill; Manohar R. Castelino; Steve Orrin; Vinay Phegade; Jr John E. Simpson


Archive | 2011

Method of restricting corporate digital information within corporate boundary

Vinay Phegade; Jason Martin; Reshma Lal; Micah J. Sheller; Tobias M. Kohlenberg


Archive | 2013

Securing display output data against malicious software attacks

Ravi Sahita; Vinay Phegade


Archive | 2012

Trusted service interaction

Vinay Phegade; Conor P. Cahill; Sanjay Bakshi

Collaboration


Dive into the Vinay Phegade's collaboration.

Researchain Logo
Decentralizing Knowledge