Efficient Remote Authentication
ABSTRACT
In 2003, Kennel and Jamieson described a method of remote machine authentication. By authentication, the authors meant that the remote machine is non-virtual, and the operating system on the remote machine is not malicious. The described method does not consider the variety of versions of each operating system. The description completely ignores the existence of modules that can be plugged into the operating system. The authors of this paper adapt the method described by Kennel and Jamieson to the real world so that it can be applied without prior knowledge of the operating system or the modules on the remote machine.
AUTHORS
Faculty of Information Technology,University of Jyväskylä
Finland
Michael Kiperberg was born in Ukraine in 1987 and migrated to Ashkelon, Israel. He received his B.Sc. and M.Sc. (both Cum Laude) in computer science from the Tel Aviv University, Israel, in 2009 and 2012, respectively. Michael is currently an Ph.D. student in the Faculty of Information Technology in University of Jyväskylä, Finland, under the supervision of Prof. Pekka Neittaanmäki and Dr. Nezer Zaidenberg. Michael has joined the Israeli Defense Forces in 2009 and is currently serving as a senior academic officer in the Israeli Air Force.
Faculty of Information Technology, University of Jyväskylä
Finland
Nezer Zaidenberg was born in Tel Aviv, Israel, in 1979. He received his B.Sc. in computer science, statistics and operations research, M.Sc. in operations research and MBA from the Tel Aviv University, Israel, in 1999, 2001 and 2006 respectively. Nezer received a Ph.D. from the University of Jyväskylä, Finland, in 2012. Nezer is the owner of Warp speed solution consulting group and has been consulting to NDS, IBM, Kardan VC, Sintecmedia among others. Nezer is currently under contract with Videocells LTD, Herzelia, Israel, where he is currently the Chief Technology Officer.
Published In
Journal of Information Warfare
The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.
Quick Links
Archive