메뉴 건너뛰기




Volumn 5487, Issue , 2009, Pages 389-405

An integrity assurance mechanism for run-time programs

Author keywords

Integrity assurance; Trusted computing; Virtual machine monitor; Virtual trusted platform module

Indexed keywords

DYNAMIC INTEGRITY; HYPERVISOR; INTEGRITY ASSURANCE; INTEGRITY MEASUREMENT; RUNTIME; TRUSTED COMPUTING; TRUSTED COMPUTING TECHNOLOGY; VIRTUAL MACHINE MONITOR; VIRTUAL TRUSTED PLATFORM MODULE;

EID: 67650112854     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-01440-6_29     Document Type: Conference Paper
Times cited : (7)

References (27)
  • 2
    • 21644455412 scopus 로고    scopus 로고
    • Terra: A virtual machine-based platform for trusted computing
    • SOSP'03: Proceedings of the 19th ACM Symposium on Operating Systems Principles
    • Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., Boneh, D.: Terra: a virtual machine-based platform for trusted computing. ACM SIGOPS Oper. Syst. Rev. 37(5), 193-206 (2003) (Pubitemid 40929697)
    • (2003) Operating Systems Review (ACM) , vol.37 , Issue.5 , pp. 193-206
    • Garfinkel, T.1    Pfaff, B.2    Chow, J.3    Rosenblum, M.4    Boneh, D.5
  • 5
    • 85084162270 scopus 로고    scopus 로고
    • Design and implementation of a tcg-based integrity measurement architecture
    • USENIX Association, Berkeley
    • Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and implementation of a tcg-based integrity measurement architecture. In: 13th conference on USENIX Security Symposium, pp. 223-238. USENIX Association, Berkeley (2004)
    • (2004) 13th conference on USENIX Security Symposium , pp. 223-238
    • Sailer, R.1    Zhang, X.2    Jaeger, T.3    Van Doorn, L.4
  • 7
    • 73249134721 scopus 로고
    • National institute of standards and technology: Secure hash standard (SHA-1)
    • National Institute of Standards and Technology: Secure Hash Standard (SHA-1). pp. 180-181. Federal Information Processing Standards Publication (1993)
    • (1993) Federal Information Processing Standards Publication , pp. 180-181
  • 8
    • 33845427178 scopus 로고    scopus 로고
    • Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems
    • DOI 10.1145/1095809.1095812
    • Seshadri, A., Luk, M., Shi, E., Perrig, A., van Doorn, L., Khosla, P.: Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems. In: 20th ACM symposium on Operating systems principles, pp. 1-16. ACM Press, New York (2005) (Pubitemid 44892201)
    • (2005) Operating Systems Review (ACM) , vol.39 , Issue.5 , pp. 1-16
    • Seshadri, A.1    Perrig, A.2    Luk, M.3    Van Doom, L.4    Shi, E.5    Khosla, P.6
  • 9
    • 27544477855 scopus 로고    scopus 로고
    • BIND: A fine-grained attestation service for secure distributed systems
    • Proceedings - 2005 IEEE Symposium on Security and Privacy, IEEE S and P 2005
    • Shi, E., Perrig, A., Doorn, L.V.: Bind: A fine-grained attestation service for secure distributed systems. In: 2005 IEEE Symposium on Security and Privacy, pp. 154-168. IEEE Press, Washington (2005) (Pubitemid 41543653)
    • (2005) Proceedings - IEEE Symposium on Security and Privacy , pp. 154-168
    • Shi, E.1    Perrig, A.2    Van Doom, L.3
  • 10
    • 84926427148 scopus 로고
    • Survey of virtual machine research
    • Goldberg, R.: Survey of Virtual Machine Research. IEEE Computer 7(6), 34-45 (1974)
    • (1974) IEEE Computer , vol.7 , Issue.6 , pp. 34-45
    • Goldberg, R.1
  • 12
    • 67650112616 scopus 로고    scopus 로고
    • Intel vanderpool technology for ia-32 processors(vt-x) preliminary specification.
    • Intel Corporation: Intel vanderpool technology for ia-32 processors(vt-x) preliminary specification. Technical Report, Intel C97063-001 (2005)
    • (2005) Technical Report, Intel C97063-001
    • Intel Corporation1
  • 18
    • 29244450159 scopus 로고    scopus 로고
    • Property-based attestation for computing platforms: Caring about properties, not mechanisms
    • ACM Press, New York
    • Sadeghi, A.R., Stuble, C.: Property-based attestation for computing platforms: caring about properties, not mechanisms. In: 2004 workshop on New security paradigms, pp. 67-77. ACM Press, New York (2004)
    • (2004) 2004 Workshop on New Security Paradigms , pp. 67-77
    • Sadeghi, A.R.1    Stuble, C.2
  • 22
    • 30144435491 scopus 로고    scopus 로고
    • Peer-to-peer access control architecture using trusted computing technology
    • DOI 10.1145/1063979.1064005, SACMAT 2005: Proceedings of 10th ACM Symposium on Access Control Models and Technologies
    • Sandhu, R., Zhang, X.: Peer-to-peer access control architecture using trusted computing technology. In: 10th ACM symposium on Access control models and technologies, pp. 147-158. ACM Press, New York (2005) (Pubitemid 43087471)
    • (2005) Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT , pp. 147-158
    • Sandhu, R.1    Zhang, X.2
  • 24
    • 30144435965 scopus 로고    scopus 로고
    • Enhancing data authenticity and integrity in P2P systems
    • DOI 10.1109/MIC.2005.124
    • Zhang, X., Chen, S., Sandhu, R.: Enhancing data authenticity and integrity in p2p systems. IEEE Internet Computing 9(6), 42-49 (2005) (Pubitemid 43051367)
    • (2005) IEEE Internet Computing , vol.9 , Issue.6 , pp. 42-49
    • Zhang, X.1    Chen, S.2    Sandhu, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.