메뉴 건너뛰기




Volumn 39, Issue 5, 2005, Pages 1-16

Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems

Author keywords

Dynamic root of trust; Rootkit detection; Self check summing code; Software based code attestation; Verifiable code execution

Indexed keywords

COMPUTER ARCHITECTURE; COMPUTER HARDWARE; LEGACY SYSTEMS; PROGRAM PROCESSORS; SECURITY SYSTEMS;

EID: 33845427178     PISSN: 01635980     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1095809.1095812     Document Type: Article
Times cited : (74)

References (29)
  • 1
    • 33845461289 scopus 로고    scopus 로고
    • Tripwire. http://sourceforge.net/projects/tripwire/.
    • Tripwire
  • 2
    • 33845401045 scopus 로고    scopus 로고
    • VMware. http://www.vmware.com/.
  • 3
    • 33751039711 scopus 로고    scopus 로고
    • AMD platform for trustworthy computing
    • September
    • AMD platform for trustworthy computing. In WinHEC, September 2003.
    • (2003) WinHEC
  • 6
    • 33845432180 scopus 로고    scopus 로고
    • Personal communication, May
    • W. Arbaugh. Personal communication, May 2005.
    • (2005)
    • Arbaugh, W.1
  • 8
    • 85092890026 scopus 로고    scopus 로고
    • Certifying program execution with secure procesors
    • B. Chen and R. Morris. Certifying program execution with secure procesors. In Proceedings of HotOS IX, 2003.
    • (2003) Proceedings of HotOS IX
    • Chen, B.1    Morris, R.2
  • 9
    • 33845464003 scopus 로고    scopus 로고
    • Ups and downs of unix/linux host-based security solutions
    • April
    • A. Chuvakin. Ups and downs of unix/linux host-based security solutions. ;login: The Magazine of USENIX and SAGE, 28(2), April 2003.
    • (2003) Login: The Magazine of USENIX and SAGE , vol.28 , Issue.2
    • Chuvakin, A.1
  • 24
    • 33845459859 scopus 로고    scopus 로고
    • Trusted Computing Group (TCG). https://www.trustedcomputinggroup.org/, 2003.
    • (2003)
  • 25
    • 33646754186 scopus 로고    scopus 로고
    • Finding collisions in the full sha-1
    • August
    • Xiaoyun Wang, Yiqun Yin, and Hongbo Yu. Finding collisions in the full sha-1. In Proceedings of Crypto, August 2005.
    • (2005) Proceedings of Crypto
    • Wang, X.1    Yin, Y.2    Yu, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.