메뉴 건너뛰기




Volumn , Issue , 2008, Pages 84-90

Reassessing the TCG specifications for trusted computing in mobile and embedded systems

Author keywords

Architectural support for security and trust; Instruction set extensions; Processor design; Software TPM

Indexed keywords

CELLULAR TELEPHONE SYSTEMS; COMPUTER HARDWARE; COMPUTER PROGRAMMING LANGUAGES; COST EFFECTIVENESS; CRYPTOGRAPHY; DISTRIBUTED COMPUTER SYSTEMS; EMBEDDED SYSTEMS; INTEGRATED CIRCUITS; MOBILE DEVICES; NONMETALS; PERSONAL COMPUTERS; RELIABILITY; SILICON; SPECIFICATIONS; TELECOMMUNICATION EQUIPMENT;

EID: 51849168710     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/HST.2008.4559060     Document Type: Conference Paper
Times cited : (16)

References (38)
  • 2
    • 51849104627 scopus 로고    scopus 로고
    • TrustZone: Integrated hardware and software security (enabling trusted computing in embedded systems)
    • Dec
    • T. Alves and D. Felton. TrustZone: Integrated hardware and software security (enabling trusted computing in embedded systems). Information Quarterly, 3(4):18-24, Dec. 2004.
    • (2004) Information Quarterly , vol.3 , Issue.4 , pp. 18-24
    • Alves, T.1    Felton, D.2
  • 4
    • 51849102889 scopus 로고    scopus 로고
    • Architectural enhancements for secure embedded processing
    • Security and Embedded Systems, of, IOS Press
    • D. Arora, S. Ravi, A. Raghunathan, and N. K. Jha. Architectural enhancements for secure embedded processing. In Security and Embedded Systems, vol. 2 of NATO Security through Science Series, pp. 18-25. IOS Press, 2006.
    • (2006) NATO Security through Science Series , vol.2 , pp. 18-25
    • Arora, D.1    Ravi, S.2    Raghunathan, A.3    Jha, N.K.4
  • 6
    • 51849128784 scopus 로고    scopus 로고
    • Mobile Trusted Module (MTM) - An Introduction
    • Technical report NRC-TR-2007-015, Nokia Research Center, Finland. Available for download at
    • J.-E. Ekberg and M. Kyläanpää. Mobile Trusted Module (MTM) - An Introduction. Technical report NRC-TR-2007-015, Nokia Research Center, Finland. Available for download at http://research.nokia.com/files/NRCTR2007015. pdf, 2007.
    • (2007)
    • Ekberg, J.-E.1    Kyläanpää, M.2
  • 7
    • 38149113740 scopus 로고    scopus 로고
    • Cryptography instruction set extensions to the SPARC V8 architecture. Preprint
    • submitted for publication
    • J. Großschädl, S. Tillich, A. Szekely, and M. Wurm. Cryptography instruction set extensions to the SPARC V8 architecture. Preprint, submitted for publication.
    • Großschädl, J.1    Tillich, S.2    Szekely, A.3    Wurm, M.4
  • 8
    • 51849124652 scopus 로고    scopus 로고
    • TrustZone security extensions strengthen ARMv6 architecture
    • 17(34):20-23, Aug. 2003
    • T. R. Halfhill. ARM dons armor: TrustZone security extensions strengthen ARMv6 architecture. Microprocessor Report, 17(34):20-23, Aug. 2003.
    • Microprocessor Report
    • Halfhill, T.R.1    dons armor, A.R.M.2
  • 9
    • 51849145112 scopus 로고    scopus 로고
    • IBM offers chip-level security: SecureBlue technology aims to make security ubiquitous in SoCs
    • 2019, 1-4, May 2006
    • T. R. Halfhill. IBM offers chip-level security: SecureBlue technology aims to make security ubiquitous in SoCs. Microprocessor Report, 20(19): 1-4, May 2006.
    • Microprocessor Report
    • Halfhill, T.R.1
  • 14
    • 51849124183 scopus 로고    scopus 로고
    • IBM, Intel Corporation, and NTT DoCoMo. Trusted Mobile Platform: Hardware Architecture Description (Revision 1.0). Specification, available for download at http://www.trusted-mobile.org/TMP_HWAD_rev1_00.pdf, Oct. 2004.
    • IBM, Intel Corporation, and NTT DoCoMo. Trusted Mobile Platform: Hardware Architecture Description (Revision 1.0). Specification, available for download at http://www.trusted-mobile.org/TMP_HWAD_rev1_00.pdf, Oct. 2004.
  • 16
    • 33751547821 scopus 로고    scopus 로고
    • ChipLock: Support for secure microarchitectures
    • Mar
    • T. Kgil, L. Falk, and T. N. Mudge. ChipLock: Support for secure microarchitectures. SIGARCH Computer Architecture News, 33(1): 134-143, Mar. 2005.
    • (2005) SIGARCH Computer Architecture News , vol.33 , Issue.1 , pp. 134-143
    • Kgil, T.1    Falk, L.2    Mudge, T.N.3
  • 18
    • 3242756924 scopus 로고    scopus 로고
    • Embedded system security
    • July
    • P. Koopman. Embedded system security. Computer, 37(7):95-97, July 2004.
    • (2004) Computer , vol.37 , Issue.7 , pp. 95-97
    • Koopman, P.1
  • 22
    • 51849143321 scopus 로고    scopus 로고
    • Designing for security - Why software isn't enough
    • Mar
    • G. Powell. Designing for security - Why software isn't enough. Information Quarterly, 5(1):14-18, Mar. 2006.
    • (2006) Information Quarterly , vol.5 , Issue.1 , pp. 14-18
    • Powell, G.1
  • 29
    • 51849089217 scopus 로고    scopus 로고
    • J. Srage and J. Azema. M-Shield™ Mobile Security Technology -Making Wireless Secure. White paper, available for dowload at http://focus.ti.com/ pdfs/wtbu/ti_mshield_whitepaper.pdf, July 2005.
    • J. Srage and J. Azema. M-Shield™ Mobile Security Technology -Making Wireless Secure. White paper, available for dowload at http://focus.ti.com/ pdfs/wtbu/ti_mshield_whitepaper.pdf, July 2005.
  • 30
    • 33845221062 scopus 로고    scopus 로고
    • Ph.D. Thesis, Massachusetts Institute of Technology, Cambridge, MA, USA
    • G. E. Suh. AEGIS: A Single-Chip Secure Processor. Ph.D. Thesis, Massachusetts Institute of Technology, Cambridge, MA, USA, 2005.
    • (2005) AEGIS: A Single-Chip Secure Processor
    • Suh, G.E.1
  • 31
    • 33750697230 scopus 로고    scopus 로고
    • Instruction set extensions for efficient AES implementation on 32-bit processors
    • Cryptographic Hardware and Embedded Systems, CHES 2006, of, Springer Verlag
    • S. Tillich and J. Großschädl. Instruction set extensions for efficient AES implementation on 32-bit processors. In Cryptographic Hardware and Embedded Systems - CHES 2006, vol. 4249 of Lecture Notes in Computer Science, pp. 270-284. Springer Verlag, 2006.
    • (2006) Lecture Notes in Computer Science , vol.4249 , pp. 270-284
    • Tillich, S.1    Großschädl, J.2
  • 32
    • 84893560866 scopus 로고    scopus 로고
    • Trusted Computing Group, Revision 1.2, Available for download at, Apr. 2004
    • Trusted Computing Group. TCG Specification Architecture Overview (Revision 1.2). Available for download at https://www.trustedcomputinggroup.org/ groups/TCG_1_0_Architecture_Overview.pdf, Apr. 2004.
    • TCG Specification Architecture Overview
  • 33
    • 51849083861 scopus 로고    scopus 로고
    • Trusted Computing Group. TCG Trusted Platform Module Specification (Version 1.2). Available for download at https://www.trustedcomputinggroup.org/ specs/TPM/, July 2007.
    • Trusted Computing Group. TCG Trusted Platform Module Specification (Version 1.2). Available for download at https://www.trustedcomputinggroup.org/ specs/TPM/, July 2007.
  • 34
    • 51849115546 scopus 로고    scopus 로고
    • Trusted Computing Group, Mobile Phone Work Group. Use Case Scenarios Version 2.7, Available for download at, Sept. 2005
    • Trusted Computing Group, Mobile Phone Work Group. Use Case Scenarios (Version 2.7). Available for download at https://www.trustedcomputinggroup.org/ groups/mobile/MPWG_Use_Cases.pdf, Sept. 2005.
  • 35
    • 51849167740 scopus 로고    scopus 로고
    • Trusted Computing Group. TCG Mobile Trusted Module Specification (Version 1.0, Revision 1). Available for download at https://www.trustedcomputinggroup. org/specs/mobilephone/tcg-mobile-trusted-module-1.0.pdf, June 2007.
    • Trusted Computing Group. TCG Mobile Trusted Module Specification (Version 1.0, Revision 1). Available for download at https://www.trustedcomputinggroup. org/specs/mobilephone/tcg-mobile-trusted-module-1.0.pdf, June 2007.
  • 36
    • 51849144218 scopus 로고    scopus 로고
    • Trusted Computing Group, Available for download at, 2007
    • Trusted Computing Group. Mobile Trusted Module Specification FAQ. Available for download at https: //www.trustedcomputinggroup.org/specs/ mobilephone/MTM_Specification_Technical_FAQ_062007.pdf, 2007.
    • Mobile Trusted Module Specification FAQ
  • 38
    • 33745171465 scopus 로고    scopus 로고
    • X. Wang, Y. L. Yin and H. Yu. Finding collisions in the full SHA-1. In Advances in Cryptology -CRYPTO 2005, 3621 of Lecture Notes in Computer Science, pp. 17-36. Springer Verlag, 2005.
    • X. Wang, Y. L. Yin and H. Yu. Finding collisions in the full SHA-1. In Advances in Cryptology -CRYPTO 2005, vol. 3621 of Lecture Notes in Computer Science, pp. 17-36. Springer Verlag, 2005.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.