-
1
-
-
70349229785
-
-
Available online at
-
Embedded XEN. Available online at: http://sourceforge.net/ projects/embeddedxen/.
-
Embedded XEN
-
-
-
2
-
-
70349240826
-
Secure Architecture and Implementation of Xen on ARM for Mobile Devices
-
available online at
-
Secure Architecture and Implementation of Xen on ARM for Mobile Devices. Presentation slides available online at: http://xensource.com/ files/xensummit-4/Secure-Xen-ARM-xen-summit-04-07-Suh.pdf.
-
Presentation slides
-
-
-
5
-
-
70349241188
-
-
ARM. Trustzone api specification, June 2006. PRD29-USGC-000089, v2.0.
-
ARM. Trustzone api specification, June 2006. PRD29-USGC-000089, v2.0.
-
-
-
-
6
-
-
70349243647
-
TrustZone Technology Overview
-
ARM Ltd, available at
-
ARM Ltd. TrustZone Technology Overview. Introduction available at: http://www.arm.com/products/esd/trustzone-home.html.
-
Introduction
-
-
-
7
-
-
70349236543
-
-
ARM Ltd, Available online at:, 2008
-
ARM Ltd. ARM1176JZF-S Technical Reference Manual, Revision: r0p7. Available online at: http://infocenter.arm.com/help/topic/com.arm.doc.ddi0301g/ DDI0301G-arm1176jzfs-r0p7-trm.pdf, 2008.
-
ARM1176JZF-S Technical Reference Manual, Revision: R0p7
-
-
-
8
-
-
70349236545
-
-
F. Bellard. Qemu open source processor emulator. Available online at: http://bellard.org/qemu/.
-
F. Bellard. Qemu open source processor emulator. Available online at: http://bellard.org/qemu/.
-
-
-
-
10
-
-
79959563402
-
An integrated architecture for trusted computing for java enabled embedded devices
-
New York, NY, USA, ACM
-
K. Dietrich. An integrated architecture for trusted computing for java enabled embedded devices. In STC'07: Proceedings of the 2007 ACM workshop on Scalable trusted computing, pages 2-6, New York, NY, USA, 2007. ACM.
-
(2007)
STC'07: Proceedings of the 2007 ACM workshop on Scalable trusted computing
, pp. 2-6
-
-
Dietrich, K.1
-
11
-
-
70349233428
-
-
S. B. et al. vTPM: Virtualizing the Trusted Platform Module. Available online at: http://www.research.ibm.com/, February 14 2006.
-
S. B. et al. vTPM: Virtualizing the Trusted Platform Module. Available online at: http://www.research.ibm.com/, February 14 2006.
-
-
-
-
12
-
-
70349255226
-
-
T. C. G. .-M. W. Group. TCG Mobile Reference Architecture Version 1.0 Revision 1. Specification available online at: https://www. trustedcomputinggroup.org/specs/mobilephone/tcg-mobile-reference-architecture-1. 0.pdf, 12 June 2007.
-
T. C. G. .-M. W. Group. TCG Mobile Reference Architecture Version 1.0 Revision 1. Specification available online at: https://www. trustedcomputinggroup.org/specs/mobilephone/tcg-mobile-reference-architecture-1. 0.pdf, 12 June 2007.
-
-
-
-
13
-
-
70349259778
-
-
T. C. G. .-M. W. Group. TCG Mobile Trusted Module Sepecification Version 1 rev. 1.0. Specification available online at: https://www. trustedcomputinggroup.org/specs/mobilephone/tcg-mobile-trusted-module-1.0.pdf, 12 June 2007.
-
T. C. G. .-M. W. Group. TCG Mobile Trusted Module Sepecification Version 1 rev. 1.0. Specification available online at: https://www. trustedcomputinggroup.org/specs/mobilephone/tcg-mobile-trusted-module-1.0.pdf, 12 June 2007.
-
-
-
-
14
-
-
70349228827
-
-
T. C. G. .-T. W. Group. TCG Software Stack (TSS) Specification Version 1.2 Level 1. Specification available online at: https://www. trustedcomputinggroup.org/specs/TSS/TSS-Version-1.2-Level-1-FINAL.pdf, 6 January 2006. Part1: Commands and Structures.
-
T. C. G. .-T. W. Group. TCG Software Stack (TSS) Specification Version 1.2 Level 1. Specification available online at: https://www. trustedcomputinggroup.org/specs/TSS/TSS-Version-1.2-Level-1-FINAL.pdf, 6 January 2006. Part1: Commands and Structures.
-
-
-
-
15
-
-
70349236544
-
-
T. C. G. .-T. W. Group. TPM Main Part 2 Structures. Specification available at: https://www.trustedcomputinggroup.org/specs/TPM/ mainP2Structrev103.zip, 9 July 2007. Specificationversion 1.2 Level 2 Revision 103.
-
T. C. G. .-T. W. Group. TPM Main Part 2 Structures. Specification available at: https://www.trustedcomputinggroup.org/specs/TPM/ mainP2Structrev103.zip, 9 July 2007. Specificationversion 1.2 Level 2 Revision 103.
-
-
-
-
16
-
-
70349253609
-
-
T. C. G. .-T. W. Group. TPM Main Part 3 Commands. Specification available online at: https://www.trustedcomputinggroup.org/specs/TPM/ mainP3Commandsrev103.zip, 9 July 2007. Specification version 1.2 Level 2 Revision 103.
-
T. C. G. .-T. W. Group. TPM Main Part 3 Commands. Specification available online at: https://www.trustedcomputinggroup.org/specs/TPM/ mainP3Commandsrev103.zip, 9 July 2007. Specification version 1.2 Level 2 Revision 103.
-
-
-
-
19
-
-
70349248980
-
-
O. K. Labs. OKL4. Available only at: http://www.ok-labs.com/ products/okl4.
-
O. K. Labs. OKL4. Available only at: http://www.ok-labs.com/ products/okl4.
-
-
-
-
20
-
-
70349238263
-
-
O. K. Labs. OKL4 microkernel source code, release 1.5.2. Available online at: http://wiki.ok-labs.com/images/2/20/Okl4-release-1.5.2.tar.gz.
-
O. K. Labs. OKL4 microkernel source code, release 1.5.2. Available online at: http://wiki.ok-labs.com/images/2/20/Okl4-release-1.5.2.tar.gz.
-
-
-
-
21
-
-
70349230458
-
-
A. U. Schmidt, N. Kuntze, and M. Kasper. On the deployment of mobile trusted modules, 2007.
-
A. U. Schmidt, N. Kuntze, and M. Kasper. On the deployment of mobile trusted modules, 2007.
-
-
-
-
22
-
-
58349115631
-
TPM Emulator
-
available at
-
M. Strasser. TPM Emulator. Software package available at: http://tpm-emulator.berlios.de/.
-
Software package
-
-
Strasser, M.1
-
24
-
-
37149014768
-
Implementing embedded security on dual-virtual-cpu systems
-
P. Wilson, A. Frey, T. Mihm, D. Kershaw, and T. Alves. Implementing embedded security on dual-virtual-cpu systems. IEEE Design and Test of Computers, 24(6):582-591, 2007.
-
(2007)
IEEE Design and Test of Computers
, vol.24
, Issue.6
, pp. 582-591
-
-
Wilson, P.1
Frey, A.2
Mihm, T.3
Kershaw, D.4
Alves, T.5
-
25
-
-
70349256841
-
-
Available online at
-
XEN Hypervisor. Available online at: http://xen.org/.
-
-
-
-
26
-
-
79959568144
-
A trusted mobile phone reference architecture via secure kernel
-
New York, NY, USA, ACM
-
X. Zhang, O. Aciicmez, and J.-P. Seifert. A trusted mobile phone reference architecture via secure kernel. In STC '07: Proceedings of the 2007 ACM workshop on Scalable trusted computing, pages 7-14, New York, NY, USA, 2007. ACM.
-
(2007)
STC '07: Proceedings of the 2007 ACM workshop on Scalable trusted computing
, pp. 7-14
-
-
Zhang, X.1
Aciicmez, O.2
Seifert, J.-P.3
|