{"id":113,"date":"2015-05-11T15:07:11","date_gmt":"2015-05-11T13:07:11","guid":{"rendered":"https:\/\/e2de.info\/?p=113"},"modified":"2015-05-29T17:31:41","modified_gmt":"2015-05-29T15:31:41","slug":"e2de-bei-der-mmsec2015","status":"publish","type":"post","link":"https:\/\/e2de.info\/?p=113&lang=de_DE","title":{"rendered":"E2DE bei der MMSec2015"},"content":{"rendered":"<p>Wir werden ein wissenschaftliches Paper zur End-to-Display Verschl\u00fcsselung auf dem ACM Workshop <a href=\"http:\/\/www.ihmmsec.org\/\">IH&amp;MMSec2015<\/a> vorstellen.<\/p>\n<p><a href=\"http:\/\/www.ihmmsec.org\/index.php\/program-2015#Abstract14\">Abstract<\/a>:<\/p>\n<blockquote><p>End-to-Display Encryption &#8211; Pixel-Domain Encryption with Security Benefit<\/p>\n<p>Author(s): Sebastian Burg; Dustin Peterson; Oliver Bringmann (University of Tuebingen, Germany)<\/p>\n<p>Providing secure access to confidential information is extremely difficult, notably when regarding weak endpoints and users. Especially with the increasing number of corporate espionage cases and data leaks, a usable approach enhancing the security of data on endpoints is needed. In this paper we introduce an approach providing a new level of security for confidential documents that are presentable<br \/>\nas images.<br \/>\nWe call that approach E2DE (End-to-Display Encryption).<br \/>\nE2DE encrypts images in the pixel-domain before transmitting them to the user. These images can then be displayed by arbitrary image viewers and are sent to the display. On the way to the display, the data stream is analyzed and the encrypted pixels are decrypted depending on a private key stored on a chip card inserted in the receiver, creating a viewable representation of the confidential data on the display, without decrypting the information on the computer itself. We implemented a protoype on a Digilent Atlys FPGA Board supporting resolutions up to Full HD.<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>Wir werden ein wissenschaftliches Paper zur End-to-Display Verschl\u00fcsselung auf dem ACM Workshop <a href=\"http:\/\/www.ihmmsec.org\/\">IH&amp;MMSec2015<\/a> vorstellen.<\/p>\n<p><a href=\"http:\/\/www.ihmmsec.org\/index.php\/program-2015#Abstract14\">Abstract<\/a>:<br \/>\n<bloc...\n<\/p>\n<\/div>","protected":false},"author":1,"featured_media":116,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[7,3],"tags":[],"_links":{"self":[{"href":"https:\/\/e2de.info?lang=de_DE%2Findex.php&rest_route=\/wp\/v2\/posts\/113"}],"collection":[{"href":"https:\/\/e2de.info?lang=de_DE%2Findex.php&rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e2de.info?lang=de_DE%2Findex.php&rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e2de.info?lang=de_DE%2Findex.php&rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/e2de.info?lang=de_DE%2Findex.php&rest_route=%2Fwp%2Fv2%2Fcomments&post=113"}],"version-history":[{"count":3,"href":"https:\/\/e2de.info?lang=de_DE%2Findex.php&rest_route=\/wp\/v2\/posts\/113\/revisions"}],"predecessor-version":[{"id":130,"href":"https:\/\/e2de.info?lang=de_DE%2Findex.php&rest_route=\/wp\/v2\/posts\/113\/revisions\/130"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e2de.info?lang=de_DE%2Findex.php&rest_route=\/wp\/v2\/media\/116"}],"wp:attachment":[{"href":"https:\/\/e2de.info?lang=de_DE%2Findex.php&rest_route=%2Fwp%2Fv2%2Fmedia&parent=113"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e2de.info?lang=de_DE%2Findex.php&rest_route=%2Fwp%2Fv2%2Fcategories&post=113"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e2de.info?lang=de_DE%2Findex.php&rest_route=%2Fwp%2Fv2%2Ftags&post=113"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}