header photo


Trust 2012 Proceedings will be published in Springer in the LNCS series. 2011 Proceedings are now available online.

Papers published and presented at previous Trust conferences:

Trust 2011 - Accepted Papers

  • Verifying Trustworthiness of Virtual Appliances in Collaborative Environments
    Cornelius Namiluko, Jun Ho Huh and Andrew Martin

  • Towards a Trustworthy, Lightweight Cloud Computing Framework for Embedded Systems
    Kurt Dietrich and Johannes Winter

  • Side-Channel Analysis of PUFs and Fuzzy Extractors
    Dominik Merli, Dieter Schuster, Frederic Stumpf and Georg Sigl

  • Coalition Resistant Anonymous Broadcast Encryption Scheme Based on PUF
    Lukasz Krzywiecki and Miroslaw Kutylowski

  • A Practical Device Authentication Scheme Using SRAM PUFs
    Patrick Koeberl, Jiangtao Li, Anand Rajan, Claire Vishik and Wei Wu

  • Practical Property-Based Attestation on Mobile Devices
    Kari Kostiainen, N. Asokam and Jan-Erik Ekberg

  • Taming Information-Stealing Smartphone Applications (on Android)
    Yajin Zhou, Xinwen Zhang, Xuxian Jiang and Vincent W. Freeh

  • Towards Permission-Based Attestation for the Android Platform - (Short Paper)
    Ingo Bente, Gabi Dreo, Bastian Hellmann, Stephan Heuser, Joerg Vieweg, Josef von Helden and Johannes Westhuis

  • Trusting to Learn: Trust and Privacy Issues in Serious Games
    Ruirui C. Huang, David Grawrock, David C. Doughty and G. Edward Suh

  • CPU Support for Secure Executables
    Peter Williams and Rick Boivie

  • Extracting Device Fingerprints from Flash Memory by Exploiting Physical Variations
    Pravin Prabhu, Ameen Akel, Laura M. Grupp, Wing-Kei S. Yu, G. Edward Suh, Edwin Kan and Steven Swanson

  • Enforcing Executing-Implies-Verified with the Integrity-Aware Processor
    Michael LeMay and Carl A. Gunter

  • Home-Network Threats and Access Controls
    Mark Baugher and Victor Lortz

  • Contego: Capability-Based Access Control for Web Browsers - (Short Paper)
    Tongbo Luo and Wenliang Du

  • Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information
    Emiliano De Cristofaro, Yanbin Lu and Gene Tsudik

  • CertainLogic: A Logic for Modeling Trust and Uncertainty - (Short Paper)
    Sebastian Ries, Sheikh Mahbub Habib, Max Mühlhäuser and Vijay Varadharajan

  • AS-TRUST: A Trust Quantification Scheme for Autonomous Systems in BGP
    Jian Chang, Krishna K. Venkatasubramanian, Andrew G. West, Sampath Kannan, Boon Thau Loo, Oleg Sokolsky and Insup Lee

  • Incentivizing Responsible Networking via Introduction-Based Routing
    Gregory Frazier, Quang Duong, Michael P. Wellman and Edward Petersen

  • Catching the Cuckoo: Verifying TPM Proximity Using a Quote Timing Side-Channel - (Short Paper)
    Russell A. Fink, Alan T. Sherman, Alexander O. Mitchell and David C. Challener

  • Group Distance Bounding Protocols - (Short Paper)
    Srdjan Capkun, Karim M. El Defrawy and Gene Tsudik

Trust 2010 - Accepted Papers

Technical Strand

  • SBAP:Software-Based Attestation for Peripherals
    Yanlin Li and Jonathan M. McCune and Adrian Perrig (CyLab, Carnegie Mellon University)

  • Robust Combiners for Software Hardening - Extended Abstract (Short Paper)
    Amir Herzberg and Haya Shulman (Bar Ilan University)

  • Engineering Attestable Services (Short Paper)
    John Lyle and Andrew Martin (Oxford University Computing Laboratory)

  • A DAA Scheme Using Batch Proof and Verification
    Liqun Chen (HP Labs)

  • Introducing the Trusted Virtual Environment Module (TVEM): A New Mechanism for Rooting Trust in Cloud Computing
    F. John Krautheim and Dhananjay S. Phatak and Alan T. Sherman (UMBC)

  • A Pairing-Based DAA Scheme Further Reducing TPM Resources
    Ernie Brickell and Jiangtao Li (Intel Corporation)

  • An Anonymous Attestation Scheme with Optional Traceability
    Jiangtao Li and Anand Rajan (Intel Corporation)

  • Beyond Kernel-level Integrity Measurement: Enabling Remote Attestation for the Android Platform
    Mohammad Nauman and Sohail Khan and Xinwen Zhang and Jean-Pierre Seifert (Institute of Management Sciences Pakistan and Samsung Information Systems America, USA and Technische Universität Berlin & Deutsche Telekom Laboratories)

  • Dynamic Enforcement of Platform Integrity (Short Paper)
    Martin Pirker and Ronald Toegl and Michael Gissing (Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Austria)

  • An Improved Memory Integrity Protection Scheme (Short Paper)
    Yin Hu and Berk Sunar (ECE Department, WPI)

  • Group-Based Attestation: Enhancing Privacy and Management in Remote Attestation
    Sami Alsouri and Oezguer Dagdelen and Stefan Katzenbeisser (TU Darmstadt)

  • The PUF Promise (Short Paper)
    Heike Busch and Miroslava Sotakova and and Stefan Katzenbeisser and Radu Sion (TU Darmstadt and Stony Brook University)

  • Requirements for an Integrity-Protected Hypervisor on the x86 Hardware Virtualized Architecture
    Amit Vasudevan and Jonathan M. McCune and Ning Qu and Leendert van Doorn and Adrian Perrig (CyLab/CMU and Nvidia Corp. and AMD)

  • Key Attestation from Trusted Execution Environments
    Kari Kostiainen and Alexandra Dmitrienko and Jan-Erik Ekberg and Ahmad-Reza Sadeghi and N. Asokan (Nokia Research Center Helsinki, Finland and Ruhr-University Bochum, Germany)

  • Lagrangian E-Voting: Verifiability on Demand and Strong Privacy
    Lukasz Krzywiecki and Miroslaw Kutylowski (Wroclaw University of Technology)

  • Application of Trusted Computing in Automation to Prevent Product Piracy
    Nora Lieberknecht (Research Center for Information Technology, Embedded Systems and Sensors Engineering (ESS))

  • Anonymous Authentication with TLS and DAA
    Emanuele Cesena and Hans Loehr and Gianluca Ramunno and Ahmad-Reza Sadeghi and Davide Vernizzi (Politecnico di Torino, Italy; Ruhr-University Bochum, Germany)

  • Towards A Trusted Mobile Desktop
    Marcel Selhorst and Christian Stüble and Utz Gnaida and Florian Feldmann (Sirrix AG and Federal Office for Information Security (BSI), Germany)

  • Escrowed Data and the Digital Envelope (Short Paper)
    King Ables and Mark D. Ryan (University of Birmingham, UK)

  • microTSS - A Simplified Trusted Software Stack
    Christian Stüble and Anoosheh Zaerin (Sirrix AG)

  • SegSlice: Towards a New Class of Secure Programming Primitives for Trustworthy Platforms
    Sergey Bratus and Michael E. Locasto and Brian Schulte (Dartmouth College and George Mason University)

Socio-Economic Strand

  • Can Competitive Insurers improve Network Security?
    Nikhil Shetty and Galina Schwartz and Jean Walrand (EECS, UC Berkeley)

  • The Leap of Faith from Online to Offline: An exploratory study of Couchsurfing.org
    Jun-E Tan (Nanyang Technological University, Singapore)

  • Axiomatic and Behavioural Trust
    Clark Thomborson (University of Auckland)

  • The Role of Soft Information in Trust Building: Evidence from Online Social Lending
    Stefanie Pötzsch and Rainer Böhme (TU Dresden and International Computer Science Institute Berkeley)

  • Nudge: Intermediaries' Role in Interdependent Network Security
    Jens Grossklags and Svetlana Radosavac and Alvaro Cardenas and John Chuang (Princeton University, DoCoMo USA Labs, Fujitsu Laboratories of America, University of California at Berkeley)

  • Ignore These At Your Peril: Ten principles for trust design
    Jens Riegelsberger and M. Angela Sasse (Google Research UK and University College London UK)

  • How the Public Views Strategies Designed to Reduce the Threat of Botnets
    Brent Rowe and Dallas Wood and Douglas Reeves (RTI International and NC State University)

  • Privacy Requirements Engineering for Trustworthy e-government Services
    Nikos Vrakas and Christos Kalloniatis and Aggeliki Tsohou and Costas Lambrinoudakis

  • Software on the witness stand: what should it take for us to trust it?
    Sergey Bratus and Ashlyn Lembree and Anna Shubina (Dartmouth, Franklin Pierce, Dartmouth)

Trust 2009

Trust 2008


Venue Information

See Venue page for details about the Conference Venue.

Call for Posters

See submission page for details.

Accepted Papers Announced

See program page for accepted papers.

Registration System online


Submission Deadline Extended!

The paper submission deadline for TRUST 2012 has been extended to 26 February 2012.

CfP announced


TRUST 2012

The TRUST 2012 website is live. Please stay tuned for details on next year's conference to be held in Vienna, Austria,  13-15 June 2012.