Kevin Butler

Learn More
—The web is a primary means of information sharing for most organizations and people. Currently, a recipient of web content knows nothing about the environment in which that information was generated other than the specific server from whence it came (and even that information can be unreliable). In this paper, we develop and evaluate the Spork system that(More)
Secure boot mechanisms aim to provide guarantees of integrity of a system as it loads. It ensures that if a system is running, all of its process will satisfy integrity verification requirements. While secure boot has been available for a long time, it is not available in commodity systems due to the high cost of secure hardware. In this paper, we describe(More)
As it becomes more common for multiple operating systems to run machines to run on a single machine, strict isolation mechanisms have become increasingly critical. While OS-level isolation protects against some attacks, all OS protections can be subverted by directly accessing a shared disk. In this paper, we introduce SwitchBlade, a disk protection model(More)
—Discovering the causes of incorrect behavior in large networks is often difficult. This difficulty is compounded when some machines in the network are compromised, since these compromised machines may use deception or tamper with data to frustrate forensic analysis. Recently proposed forensic tools enable administrators to learn the causes of some system(More)
Asynchronous Model-Since TPM is a slow device, we need to keep it out of the critical path of high demand services.-The web server creates request-independent attestations by combining the time with a hash tree of the served content.-A root of trust time service provides verifiable attestations of the current time to ensure freshness. When using the web,(More)
— Interdomain routing is implemented on the Internet through the Border Gateway Protocol (BGP). Many approaches have been proposed to mitigate or solve the many problems of BGP security; yet, none of the proposed solutions have been widely deployed. The lack of adoption is largely caused by a failure to find an acceptable balance between deployability,(More)
In response to growing concern about the security and integrity of elections in the state of Ohio, Secretary of State Jennifer Brunner set in motion a comprehensive study of the electronic voting equipment used throughout the state. Known as Project EVEREST (Evaluation and Validation of Election Related Equipment, Standards and Testing), this study(More)
Non-volatile memories provide energy efficiency, tolerance against power failure, and " instant-on " power-up. These memories are likely to replace traditional volatile memory in next-generation lap-tops and desktops. However, the move to non-volatile memory introduces new vulnerabilities; sensitive data such as passwords and keys residing in main memory(More)
— BGPRV is a tool aimed to aid the analysis of BGP updates or routing table snapshots. It provides a set of library functions that make it possible to retrieve and process archived BGP data with efficiency and convenience. It encapsulates the functions of scanning the Route Views route repository, downloading data for specified time frame, processing the(More)