메뉴 건너뛰기




Volumn 4968 LNCS, Issue , 2008, Pages 14-32

TOCTOU, traps, and trusted computing

Author keywords

[No Author keywords available]

Indexed keywords

MEMORY ACCESSES; MONITORING CAPABILITIES; PLATFORM CONFIGURATIONS; SECURITY POLICIES; SOFTWARE PROTOTYPES; TRUSTED COMPUTING; VIRTUAL MACHINE MONITORS;

EID: 54249122693     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-68979-9_2     Document Type: Conference Paper
Times cited : (58)

References (28)
  • 1
    • 54249154991 scopus 로고    scopus 로고
    • Trusted Computing Group: Home
    • Trusted Computing Group: Homepage, http://www.trustedcomputinggroup.org
  • 2
    • 85013596514 scopus 로고    scopus 로고
    • Concepts of Trusted Computing
    • Mitchell, C, ed
    • Proudler, G.: Concepts of Trusted Computing. In: Mitchell, C. (ed.) Trusted Computing, IET, pp, 11-27 (2005)
    • (2005) Trusted Computing, IET , pp. 11-27
    • Proudler, G.1
  • 4
    • 29244472125 scopus 로고    scopus 로고
    • Property-Based Attestation for Computing Platforms: Caring about Properties, not Mechanisms
    • Sadeghi, A.R., Stüble, C.: Property-Based Attestation for Computing Platforms: Caring about Properties, not Mechanisms. In: New Security Paradigms Workshop (2004)
    • (2004) New Security Paradigms Workshop
    • Sadeghi, A.R.1    Stüble, C.2
  • 5
    • 3042542290 scopus 로고    scopus 로고
    • The Kernel Craze
    • Arce, I.: The Kernel Craze. IEEE Security and Privacy 2(3), 79-81 (2004)
    • (2004) IEEE Security and Privacy , vol.2 , Issue.3 , pp. 79-81
    • Arce, I.1
  • 6
    • 33646056390 scopus 로고    scopus 로고
    • Franklin, M., Mitcham, K., Smith, S.W., Stabiner, J., Wild, O.: CA-in-a-Box. In: Chadwick, D., Zhao, G. (eds.) EuroPKI 2005. LNCS, 3545, pp. 180-190, Springer, Heidelberg (2005)
    • Franklin, M., Mitcham, K., Smith, S.W., Stabiner, J., Wild, O.: CA-in-a-Box. In: Chadwick, D., Zhao, G. (eds.) EuroPKI 2005. LNCS, vol. 3545, pp. 180-190, Springer, Heidelberg (2005)
  • 10
    • 50949106225 scopus 로고    scopus 로고
    • Department of Computer Science. Swiss Federal Institute of Technology Zurich
    • Strasser, M.: Software-based TPM Emulator for Linux. Department of Computer Science. Swiss Federal Institute of Technology Zurich (2004)
    • (2004) Software-based TPM Emulator for Linux
    • Strasser, M.1
  • 11
    • 84910156435 scopus 로고    scopus 로고
    • Berger, S., Caceres, R., Goldman, K., Perez, R., Sailer, R., van Doom, L.: vTPM - Virtualizing the Trusted Platform Module. In: 15th Usenix Security Symposium, pp. 305-320 (2006)
    • Berger, S., Caceres, R., Goldman, K., Perez, R., Sailer, R., van Doom, L.: vTPM - Virtualizing the Trusted Platform Module. In: 15th Usenix Security Symposium, pp. 305-320 (2006)
  • 12
    • 54249098553 scopus 로고    scopus 로고
    • Exploring the Integration of Memory Management and Trusted Computing
    • Technical Report TR 2007-594, Dartmouth College, Computer Science, Hanover, NH May
    • D'Cunha, N.: Exploring the Integration of Memory Management and Trusted Computing, Technical Report TR 2007-594, Dartmouth College, Computer Science, Hanover, NH (May 2007)
    • (2007)
    • D'Cunha, N.1
  • 14
    • 54249126817 scopus 로고    scopus 로고
    • Sadeghi, A.R, Selhorst, M, Stüble, C, Wachsmann, C, Winandy, M, TCG Inside, A Note on TPM Specification Compliance
    • Sadeghi, A.R., Selhorst, M., Stüble, C., Wachsmann, C., Winandy, M.: TCG Inside - A Note on TPM Specification Compliance.
  • 15
    • 54249156323 scopus 로고    scopus 로고
    • Kauer, B.: OSLO: Improving the security of Trusted Computing. Technical report, Technische Universitat Dresden, Department of Computer Science (A later version appeared at USENIX Security 2007) (2007)
    • Kauer, B.: OSLO: Improving the security of Trusted Computing. Technical report, Technische Universitat Dresden, Department of Computer Science (A later version appeared at USENIX Security 2007) (2007)
  • 16
    • 54249138072 scopus 로고    scopus 로고
    • Sparks, E.: TPM Reset Attack, http://www.cs.dartmouth.edu/~pkilab/sparks/
    • Sparks, E.: TPM Reset Attack, http://www.cs.dartmouth.edu/~pkilab/sparks/
  • 18
    • 43649103310 scopus 로고    scopus 로고
    • A Security Assessment of Trusted Platform Modules
    • Technical Report TR2007-587, Dartmouth College, Computer Science, Hanover, NH June
    • Sparks, E.: A Security Assessment of Trusted Platform Modules. Technical Report TR2007-587, Dartmouth College, Computer Science, Hanover, NH (June 2007)
    • (2007)
    • Sparks, E.1
  • 20
    • 85084162270 scopus 로고    scopus 로고
    • Design and Implementation of a TCG-based Integrity Measurement Architecture
    • Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and Implementation of a TCG-based Integrity Measurement Architecture. In: USENIX Security Symposium, pp. 223-238 (2004)
    • (2004) USENIX Security Symposium , pp. 223-238
    • Sailer, R.1    Zhang, X.2    Jaeger, T.3    van Doorn, L.4
  • 21
    • 21644454794 scopus 로고    scopus 로고
    • Marchesini, J., Smith, S.W., Wild, O., Stabiner, J., Barsamian, A.: Open-Source Applications of TCPA Hardware. In: Yew, P.-C., Xue, J. (eds.) ACSAC 2004, LNCS, 3189, pp. 294-303. Springer, Heidelberg (2004)
    • Marchesini, J., Smith, S.W., Wild, O., Stabiner, J., Barsamian, A.: Open-Source Applications of TCPA Hardware. In: Yew, P.-C., Xue, J. (eds.) ACSAC 2004, LNCS, vol. 3189, pp. 294-303. Springer, Heidelberg (2004)
  • 22
    • 21644470487 scopus 로고    scopus 로고
    • Experimenting with TCPA/TCG Hardware, Or: How I Learned to Stop Worrying and Love The Bear
    • Technical Report TR2003-476, Dartmouth College, Computer Science, Hanover, NH December
    • Marchesini, J., Smith, S.W., Wild, O., MacDonald, R.: Experimenting with TCPA/TCG Hardware, Or: How I Learned to Stop Worrying and Love The Bear. Technical Report TR2003-476, Dartmouth College, Computer Science, Hanover, NH (December 2003)
    • (2003)
    • Marchesini, J.1    Smith, S.W.2    Wild, O.3    MacDonald, R.4
  • 25
    • 27544477855 scopus 로고    scopus 로고
    • Shi, E., Perrig, A., van Doom, L.: BIND: A Fine-Grained Attestation Service for Secure Distributed Systems. In: IEEE Symposium on Security and Privacy, pp. 154-168 (2005)
    • Shi, E., Perrig, A., van Doom, L.: BIND: A Fine-Grained Attestation Service for Secure Distributed Systems. In: IEEE Symposium on Security and Privacy, pp. 154-168 (2005)
  • 28
    • 54249161304 scopus 로고    scopus 로고
    • A Dynamic Trust Management Solution for Platform Security Using Integrity Measurements
    • Technical report, Hewlett-Packard Laboratories April
    • Cabuk, S., Plaquin, D., Dalton, C.I.: A Dynamic Trust Management Solution for Platform Security Using Integrity Measurements. Technical report, Hewlett-Packard Laboratories (April 2007)
    • (2007)
    • Cabuk, S.1    Plaquin, D.2    Dalton, C.I.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.