메뉴 건너뛰기




Volumn 5471 LNCS, Issue , 2009, Pages 183-196

Attacking the bitlocker boot process

Author keywords

[No Author keywords available]

Indexed keywords

ART DESIGN; ATTACK STRATEGIES; BITLOCKER; MICROSOFT WINDOWS; TRUSTED COMPUTING;

EID: 70350686780     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-00587-9_12     Document Type: Conference Paper
Times cited : (19)

References (18)
  • 3
    • 44049086023 scopus 로고    scopus 로고
    • AES-CBC + Elephant diffuser: A disk encryption algorithm for windows vista
    • Tech. rep, Microsoft
    • Fergusson, N.: AES-CBC + Elephant diffuser: A disk encryption algorithm for windows vista. Tech. rep., Microsoft (2006)
    • (2006)
    • Fergusson, N.1
  • 5
    • 70350652038 scopus 로고    scopus 로고
    • NVbit: Accessing bitlocker volumes from linux
    • NVlabs: NVbit: Accessing bitlocker volumes from linux. Web page (2008), http://www.nvlabs.in/node/9
    • (2008) Web page
  • 10
    • 43649103310 scopus 로고    scopus 로고
    • Security assessment of trusted platform modules
    • Tech. rep, Dartmouth College
    • Sparks, E.R.: Security assessment of trusted platform modules. Tech. rep., Dartmouth College (2007)
    • (2007)
    • Sparks, E.R.1
  • 13
    • 68549104046 scopus 로고    scopus 로고
    • Weingart, S.H.: Physical security devices for computer subsystems: A survey of attacks and defenses. In: Paar, C., Koç, Ç .K. (eds.) CHES 2000. LNCS, 1965, pp. 302-317. Springer, Heidelberg (2000)
    • Weingart, S.H.: Physical security devices for computer subsystems: A survey of attacks and defenses. In: Paar, C., Koç, Ç .K. (eds.) CHES 2000. LNCS, vol. 1965, pp. 302-317. Springer, Heidelberg (2000)
  • 15
    • 85066944987 scopus 로고    scopus 로고
    • Keep your enemies close: Distance bounding against smartcard relay attacks
    • Drimer, S., Murdoch, S.J.: Keep your enemies close: Distance bounding against smartcard relay attacks. In: USENIX Security 2007 (2007)
    • (2007) USENIX Security
    • Drimer, S.1    Murdoch, S.J.2
  • 18
    • 49049115189 scopus 로고    scopus 로고
    • Hargreaves, C., Chivers, H.: Recovery of encryption keys from memory using a linear scan. In: Proceedings of Third International Conference on Availability, Reliability and Security, ARES 2008, pp. 1369-1376 (2008), doi:10.1109/ARES.2008.109
    • Hargreaves, C., Chivers, H.: Recovery of encryption keys from memory using a linear scan. In: Proceedings of Third International Conference on Availability, Reliability and Security, ARES 2008, pp. 1369-1376 (2008), doi:10.1109/ARES.2008.109


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.