Efficient Remote Authentication

ABSTRACT

In 2003, Kennel and Jamieson described a method of remote machine authentication. By authentication, the authors meant that the remote machine is non-virtual, and the operating system on the remote machine is not malicious. The described method does not consider the variety of versions of each operating system. The description completely ignores the existence of modules that can be plugged into the operating system. The authors of this paper adapt the method described by Kennel and Jamieson to the real world so that it can be applied without prior knowledge of the operating system or the modules on the remote machine.


AUTHORS

Photo of Michael Kiperberg

Faculty of Information Technology,University of Jyväskylä
Finland

Michael Kiperberg was born in Ukraine in 1987 and migrated to Ashkelon, Israel. He received his B.Sc. and M.Sc. (both Cum Laude) in computer science from the Tel Aviv University, Israel, in 2009 and 2012, respectively. Michael is currently an Ph.D. student in the Faculty of Information Technology in University of Jyväskylä, Finland, under the supervision of Prof. Pekka Neittaanmäki and Dr. Nezer Zaidenberg. Michael has joined the Israeli Defense Forces in 2009 and is currently serving as a senior academic officer in the Israeli Air Force.

Photo of Nezer Zaidenberg

Faculty of Information Technology, University of Jyväskylä
Finland

Nezer Zaidenberg was born in Tel Aviv, Israel, in 1979. He received his B.Sc. in computer science, statistics and operations research, M.Sc. in operations research and MBA from the Tel Aviv University, Israel, in 1999, 2001 and 2006 respectively. Nezer received a Ph.D. from the University of Jyväskylä, Finland, in 2012. Nezer is the owner of Warp speed solution consulting group and has been consulting to NDS, IBM, Kardan VC, Sintecmedia among others. Nezer is currently under contract with Videocells LTD, Herzelia, Israel, where he is currently the Chief Technology Officer.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

C

C2
C2S
CDX
CIA
CIP
CPS

I

IA
ICS

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

  • Journal of Information Warfare
    114 Ballard Street
    Yorktown, VA
    23690
  • 757.871.3949
  • jiw@gbpts.com