메뉴 건너뛰기




Volumn 74, Issue 1-2, 2008, Pages 13-22

Remote attestation on legacy operating systems with trusted platform modules

Author keywords

Attestation; Remote software authentication; Timed execution; Trusted platform module

Indexed keywords

CLIENT SERVER COMPUTER SYSTEMS; CODES (SYMBOLS); COMPUTER OPERATING SYSTEMS; COMPUTER SOFTWARE SELECTION AND EVALUATION; CRYPTOGRAPHY; LEGACY SYSTEMS; SOLUTIONS; VERIFICATION;

EID: 56349171224     PISSN: 01676423     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.scico.2008.09.005     Document Type: Article
Times cited : (69)

References (29)
  • 1
    • 84955621400 scopus 로고    scopus 로고
    • Tamper resistant software: An implementation
    • First International Workshop on Information Hiding. Anderson R.J. (Ed). Cambridge, U.K., May 30-June 1, 1996, Springer
    • Aucsmith D. Tamper resistant software: An implementation. In: Anderson R.J. (Ed). First International Workshop on Information Hiding. Cambridge, U.K., May 30-June 1, 1996. Lecture Notes in Computer Science vol. 1174 (1996), Springer
    • (1996) Lecture Notes in Computer Science , vol.1174
    • Aucsmith, D.1
  • 3
    • 14844295011 scopus 로고    scopus 로고
    • Direct anonymous attestation
    • Atluri V., Pfitzmann B., and McDaniel P.D. (Eds). CCS 2004, Washington, DC, USA, October 25-29, 2004, ACM
    • Brickell E.F., Camenisch J., and Chen L. Direct anonymous attestation. In: Atluri V., Pfitzmann B., and McDaniel P.D. (Eds). 11th ACM Conference on Computer and Communications Security. CCS 2004, Washington, DC, USA, October 25-29, 2004 (2004), ACM
    • (2004) 11th ACM Conference on Computer and Communications Security
    • Brickell, E.F.1    Camenisch, J.2    Chen, L.3
  • 4
    • 47749090850 scopus 로고    scopus 로고
    • M. Ceccato, M.D. Preda, J. Nagra, C. Collberg, P. Tonella, Barrier slicing for remote software trusting, in: 7th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM'07, September 30-October 1, Paris, France, 2007
    • M. Ceccato, M.D. Preda, J. Nagra, C. Collberg, P. Tonella, Barrier slicing for remote software trusting, in: 7th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM'07, September 30-October 1, Paris, France, 2007
  • 5
    • 27944437085 scopus 로고    scopus 로고
    • Virtual leashing: Internet-based software piracy protection
    • ICDCS 2005, 6-10 June 2005, Columbus, OH, USA, IEEE Computer Society
    • Dvir O., Herlihy M., and Shavit N. Virtual leashing: Internet-based software piracy protection. 25th International Conference on Distributed Computing Systems. ICDCS 2005, 6-10 June 2005, Columbus, OH, USA (2005), IEEE Computer Society
    • (2005) 25th International Conference on Distributed Computing Systems
    • Dvir, O.1    Herlihy, M.2    Shavit, N.3
  • 7
    • 34047170729 scopus 로고    scopus 로고
    • Software integrity protection using timed executable agents
    • Lin F.-C., Lee D.-T., Lin B.-S., Shieh S., and Jajodia S. (Eds). ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006, ACM
    • Garay J.A., and Huelsbergen L. Software integrity protection using timed executable agents. In: Lin F.-C., Lee D.-T., Lin B.-S., Shieh S., and Jajodia S. (Eds). 2006 ACM Symposium on Information, Computer and Communications Security. ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006 (2006), ACM
    • (2006) 2006 ACM Symposium on Information, Computer and Communications Security
    • Garay, J.A.1    Huelsbergen, L.2
  • 8
    • 21644455412 scopus 로고    scopus 로고
    • T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, D. Boneh, Terra: A virtual machine-based platform for trusted computing, in: 19th Symposium on Operating System Principles, October 19-22, 2003, Bolton Landing, NY, USA, 2003
    • T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, D. Boneh, Terra: A virtual machine-based platform for trusted computing, in: 19th Symposium on Operating System Principles, October 19-22, 2003, Bolton Landing, NY, USA, 2003
  • 9
    • 33846272389 scopus 로고    scopus 로고
    • Strengthening software self-checksumming via self-modifying code
    • ACSAC 2005, 5-9 December 2005, Tucson, AZ, USA, IEEE Computer Society
    • Giffin J.T., Christodorescu M., and Kruger L. Strengthening software self-checksumming via self-modifying code. 21st Annual Computer Security Applications Conference. ACSAC 2005, 5-9 December 2005, Tucson, AZ, USA (2005), IEEE Computer Society
    • (2005) 21st Annual Computer Security Applications Conference
    • Giffin, J.T.1    Christodorescu, M.2    Kruger, L.3
  • 11
    • 70349659108 scopus 로고    scopus 로고
    • V. Haldar, D. Chandra, M. Franz, Semantic remote attestation - virtual machine directed approach to trusted computing, in: 3rd Virtual Machine Research and Technology Symposium, May 6-7, 2004, San Jose, CA, USA, USENIX, 2004
    • V. Haldar, D. Chandra, M. Franz, Semantic remote attestation - virtual machine directed approach to trusted computing, in: 3rd Virtual Machine Research and Technology Symposium, May 6-7, 2004, San Jose, CA, USA, USENIX, 2004
  • 12
    • 85077706009 scopus 로고    scopus 로고
    • B. Kauer, OSLO: Improving the security of trusted computing, in: 16th USENIX Security Symposium, August 6-10, 2007, Boston, MA, USA, USENIX, 2007
    • B. Kauer, OSLO: Improving the security of trusted computing, in: 16th USENIX Security Symposium, August 6-10, 2007, Boston, MA, USA, USENIX, 2007
  • 13
    • 85028170979 scopus 로고    scopus 로고
    • R. Kennell, L.H. Jamieson, Establishing the genuinity of remote computer systems, in: 12th USENIX Security Symposium, August 4-8, 2003, Washington, DC, USA, USENIX, 2003
    • R. Kennell, L.H. Jamieson, Establishing the genuinity of remote computer systems, in: 12th USENIX Security Symposium, August 4-8, 2003, Washington, DC, USA, USENIX, 2003
  • 14
    • 79959566693 scopus 로고    scopus 로고
    • Realizing property-based attestation and sealing with commonly available hard- and software
    • STC'07, ACM, New York, NY, USA
    • Kühn U., Selhorst M., and Stüble C. Realizing property-based attestation and sealing with commonly available hard- and software. 2007 ACM Workshop on Scalable Trusted Computing. STC'07 (2007), ACM, New York, NY, USA
    • (2007) 2007 ACM Workshop on Scalable Trusted Computing
    • Kühn, U.1    Selhorst, M.2    Stüble, C.3
  • 15
    • 77952132371 scopus 로고    scopus 로고
    • J.M. McCune, B. Parno, A. Perrig, M.K. Reiter, H. Isozaki, Flicker: An execution infrastructure for TCB minimization, in: ACM European Conference in Computer Systems, EuroSys 2008, 2008
    • J.M. McCune, B. Parno, A. Perrig, M.K. Reiter, H. Isozaki, Flicker: An execution infrastructure for TCB minimization, in: ACM European Conference in Computer Systems, EuroSys 2008, 2008
  • 17
    • 33646445517 scopus 로고    scopus 로고
    • NGSCB: A trusted open system
    • 9th Australasian Conference on Information Security and Privacy. Wang H., Pieprzyk J., and Varadharajan V. (Eds). ACISP 2004, Sydney, Australia, July 13-15, 2004, Springer
    • Peinado M., Chen Y., England P., and Manferdelli J. NGSCB: A trusted open system. In: Wang H., Pieprzyk J., and Varadharajan V. (Eds). 9th Australasian Conference on Information Security and Privacy. ACISP 2004, Sydney, Australia, July 13-15, 2004. Lecture Notes in Computer Science vol. 3108 (2004), Springer
    • (2004) Lecture Notes in Computer Science , vol.3108
    • Peinado, M.1    Chen, Y.2    England, P.3    Manferdelli, J.4
  • 19
    • 29244450159 scopus 로고    scopus 로고
    • Property-based attestation for computing platforms: Caring about properties, not mechanisms
    • Hempelmann C., and Raskin V. (Eds). September 20-23, 2004, Nova Scotia, Canada, ACM
    • Sadeghi A.-R., and Stüble C. Property-based attestation for computing platforms: Caring about properties, not mechanisms. In: Hempelmann C., and Raskin V. (Eds). New Security Paradigms Workshop 2004. September 20-23, 2004, Nova Scotia, Canada (2004), ACM
    • (2004) New Security Paradigms Workshop 2004
    • Sadeghi, A.-R.1    Stüble, C.2
  • 20
    • 85084162270 scopus 로고    scopus 로고
    • R. Sailer, X. Zhang, T. Jaeger, L. van Doorn, Design and implementation of a TCG-based integrity measurement architecture, in: 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, USENIX, 2004
    • R. Sailer, X. Zhang, T. Jaeger, L. van Doorn, Design and implementation of a TCG-based integrity measurement architecture, in: 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, USENIX, 2004
  • 22
    • 84885617227 scopus 로고    scopus 로고
    • Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems
    • Herbert A., and Birman K.P. (Eds). SOSP 2005, Brighton, UK, October 23-26, 2005, ACM
    • Seshadri A., Luk M., Shi E., Perrig A., van Doorn L., and Khosla P.K. Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems. In: Herbert A., and Birman K.P. (Eds). 20th ACM Symposium on Operating Systems Principles 2005. SOSP 2005, Brighton, UK, October 23-26, 2005 (2005), ACM
    • (2005) 20th ACM Symposium on Operating Systems Principles 2005
    • Seshadri, A.1    Luk, M.2    Shi, E.3    Perrig, A.4    van Doorn, L.5    Khosla, P.K.6
  • 23
    • 3042738543 scopus 로고    scopus 로고
    • SWATT: SoftWare-based ATTestation for embedded devices
    • S&P 2004, 9-12 May 2004, Berkeley, CA, USA, IEEE Computer Society
    • Seshadri A., Perrig A., van Doorn L., and Khosla P.K. SWATT: SoftWare-based ATTestation for embedded devices. 2004 IEEE Symposium on Security and Privacy. S&P 2004, 9-12 May 2004, Berkeley, CA, USA (2004), IEEE Computer Society
    • (2004) 2004 IEEE Symposium on Security and Privacy
    • Seshadri, A.1    Perrig, A.2    van Doorn, L.3    Khosla, P.K.4
  • 24
    • 85084162788 scopus 로고    scopus 로고
    • U. Shankar, M. Chew, J.D. Tygar, Side effects are not sufficient to authenticate software, in: 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, USENIX, 2004
    • U. Shankar, M. Chew, J.D. Tygar, Side effects are not sufficient to authenticate software, in: 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, USENIX, 2004
  • 25
    • 27544477855 scopus 로고    scopus 로고
    • BIND: A fine-grained attestation service for secure distributed systems
    • S&P 2005, 8-11 May 2005, Oakland, CA, USA, IEEE Computer Society
    • Shi E., Perrig A., and van Doorn L. BIND: A fine-grained attestation service for secure distributed systems. 2005 IEEE Symposium on Security and Privacy. S&P 2005, 8-11 May 2005, Oakland, CA, USA (2005), IEEE Computer Society
    • (2005) 2005 IEEE Symposium on Security and Privacy
    • Shi, E.1    Perrig, A.2    van Doorn, L.3
  • 26
    • 38049096323 scopus 로고    scopus 로고
    • Delayed and controlled failures in tamper-resistant systems
    • 8th Information Hiding
    • Tan G., Chen Y., and Jakubowski M.H. Delayed and controlled failures in tamper-resistant systems. 8th Information Hiding. Lecture Notes in Computer Science, LNCS vol. 4437 (2006)
    • (2006) Lecture Notes in Computer Science, LNCS , vol.4437
    • Tan, G.1    Chen, Y.2    Jakubowski, M.H.3
  • 28
    • 24344490175 scopus 로고    scopus 로고
    • A generic attack on checksumming-based software tamper resistance
    • S&P 2005, 8-11 May 2005, Oakland, CA, USA, IEEE Computer Society
    • Wurster G., van Oorschot P.C., and Somayaji A. A generic attack on checksumming-based software tamper resistance. 2005 IEEE Symposium on Security and Privacy. S&P 2005, 8-11 May 2005, Oakland, CA, USA (2005), IEEE Computer Society
    • (2005) 2005 IEEE Symposium on Security and Privacy
    • Wurster, G.1    van Oorschot, P.C.2    Somayaji, A.3
  • 29


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.