-
1
-
-
13244299564
-
-
RFC 3748 (Proposed Standard), June
-
Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., Levkowetz H.: Extensible Authentication Protocol (EAP). RFC 3748 (Proposed Standard), June (2004).
-
(2004)
Extensible Authentication Protocol (EAP)
-
-
Aboba, B.1
Blunk, L.2
Vollbrecht, J.3
Carlson, J.4
Levkowetz, H.5
-
2
-
-
70349245595
-
An efficient implementation of trusted channels based on openssl
-
ACM, New York, NY, USA
-
Armknecht, F., Gasmi, Y., Sadeghi, A.-R., Stewin, P., Unger, M., Ramunno, G., Vernizzi, D.: An efficient implementation of trusted channels based on openssl. In: STC '08: Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, pp. 41-50. ACM, New York, NY, USA (2008).
-
(2008)
STC '08: Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing
, pp. 41-50
-
-
Armknecht, F.1
Gasmi, Y.2
Sadeghi, A.-R.3
Stewin, P.4
Unger, M.5
Ramunno, G.6
Vernizzi, D.7
-
3
-
-
1142270162
-
-
(Eds.), Upper Saddle River, NJ: Prentice Hall PTR
-
Balacheff, B., Chen, L., Pearson, S., Plaquin, D., Proudler, G. (eds): Trusted Computing Platforms: TCPA Technology in Context. Prentice Hall PTR, Upper Saddle River, NJ (2003).
-
(2003)
Trusted Computing Platforms: TCPA Technology in Context
-
-
Balacheff, B.1
Chen, L.2
Pearson, S.3
Plaquin, D.4
Proudler, G.5
-
4
-
-
34547196300
-
A protocol for property-based attestation
-
ACM Press, New York, NY, USA
-
Chen, L., Landfermann, R., Löhr, H., Rohe, M., Sadeghi, A.-R., Stüble, C.: A protocol for property-based attestation. In: STC '06: Proceedings, First ACM Workshop on Scalable Trusted Computing, pp. 7-16. ACM Press, New York, NY, USA (2006).
-
(2006)
STC '06: Proceedings, First ACM Workshop on Scalable Trusted Computing
, pp. 7-16
-
-
Chen, L.1
Landfermann, R.2
Löhr, H.3
Rohe, M.4
Sadeghi, A.-R.5
Stüble, C.6
-
8
-
-
79957442692
-
The SAL language manual
-
deMoura, L., Owre, S., Shankar, N.: The SAL language manual. Technical Report SRI-CSL-01-02, SRI International (2003).
-
(2003)
Technical Report SRI-CSL-01-02, SRI International
-
-
deMoura, L.1
Owre, S.2
Shankar, N.3
-
9
-
-
35048899619
-
Searching for shapes in cryptographic protocols
-
Springer,. Extended version at
-
Doghmi, S. F., Guttman, J. D., Thayer, F. J.: Searching for shapes in cryptographic protocols. In: Tools and Algorithms for Construction and Analysis of Systems (TACAS), Number 4424 in LNCS, pp. 523-538. Springer, (2007). Extended version at http://www. eprint. iacr. org/2006/435.
-
(2007)
Tools and Algorithms for Construction and Analysis of Systems (TACAS), Number 4424 in LNCS
, pp. 523-538
-
-
Doghmi, S.F.1
Guttman, J.D.2
Thayer, F.J.3
-
10
-
-
79952612270
-
Beyond secure channels
-
ACM, New York, NY, USA
-
Gasmi, Y., Sadeghi, A.-R., Stewin, P., Unger, M., Asokan, N.: Beyond secure channels. In: STC '07: Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing, pp. 30-40. ACM, New York, NY, USA (2007).
-
(2007)
STC '07: Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing
, pp. 30-40
-
-
Gasmi, Y.1
Sadeghi, A.-R.2
Stewin, P.3
Unger, M.4
Asokan, N.5
-
13
-
-
70349234685
-
Remote attestation on program execution
-
ACM, New York, NY, USA
-
Gu, L., Ding, X., Deng, R. H., Xie, B., Mei, H.: Remote attestation on program execution. In: STC '08: Proceedings of the 3rd ACM Workshop on Scalable Trusted computing, pp. 11-20. ACM, New York, NY, USA (2008).
-
(2008)
STC '08: Proceedings of the 3rd ACM Workshop on Scalable Trusted computing
, pp. 11-20
-
-
Gu, L.1
Ding, X.2
Deng, R.H.3
Xie, B.4
Mei, H.5
-
14
-
-
3042563843
-
Authentication tests and disjoint encryption: a design method for security protocols
-
Guttman J. D.: Authentication tests and disjoint encryption: a design method for security protocols. J. Comput. Secur. 12(3/4), 409-433 (2004).
-
(2004)
J. Comput. Secur.
, vol.12
, Issue.3-4
, pp. 409-433
-
-
Guttman, J.D.1
-
15
-
-
33646176467
-
Programming cryptographic protocols
-
In: De Nicola, R., Sangiorgi, D. (eds.) Springer
-
Guttman, J. D., Herzog, J. C., Ramsdell, J. D., Sniffen, B. T.: Programming cryptographic protocols. In: De Nicola, R., Sangiorgi, D. (eds.) Trust in Global Computing, number 3705 in LNCS, pp. 116-145. Springer, (2005).
-
(2005)
Trust in Global Computing, number 3705 in LNCS
, pp. 116-145
-
-
Guttman, J.D.1
Herzog, J.C.2
Ramsdell, J.D.3
Sniffen, B.T.4
-
16
-
-
35048867881
-
Trust management in strand spaces: a rely-guarantee method
-
Springer (2004)
-
Guttman, J. D., Thayer, F. J., Carlson, J. A., Herzog, J. C., Ramsdell, J. D., Sniffen, B. T.: Trust management in strand spaces: a rely-guarantee method. In: Schmidt, D. (ed.) Programming Languages and Systems: 13th European Symposium on Programming, number 2986 in LNCS, pp. 325-339. Springer (2004).
-
(2004)
Programming Languages and Systems: 13th European Symposium on Programming, number 2986 in LNCS
, pp. 325-339
-
-
Guttman, J.D.1
Thayer, F.J.2
Carlson, J.A.3
Herzog, J.C.4
Ramsdell, J.D.5
Sniffen, B.T.6
-
17
-
-
70349659108
-
Semantic remote attestation-a virtual machine directed approach to trusted computing
-
USENIX, May
-
Haldar, V., Chandra, D., Franz, M.: Semantic remote attestation-a virtual machine directed approach to trusted computing. In: Proceedings of the Third virtual Machine Research and Technology Symposium, pp. 29-41. USENIX, May (2004).
-
(2004)
Proceedings of the Third virtual Machine Research and Technology Symposium
, pp. 29-41
-
-
Haldar, V.1
Chandra, D.2
Franz, M.3
-
18
-
-
85084162914
-
Copilot-a coprocessor-based kernel runtime integrity monitor
-
USENIX
-
Petroni, N. L. Jr., Fraser, T., Molina, J., Arbaugh, W. A.: Copilot-a coprocessor-based kernel runtime integrity monitor. In: USENIX Security Symposium, pp. 179-194. USENIX (2004).
-
(2004)
USENIX Security Symposium
, pp. 179-194
-
-
Petroni Jr., N.L.1
Fraser, T.2
Molina, J.3
Arbaugh, W.A.4
-
19
-
-
34547148412
-
Layering negotiations for flexible attestation
-
ACM Press, New York, NY, USA
-
Katsuno, Y., Watanabe, Y., Yoshihama, S., Mishina, T., Kudoh, M.: Layering negotiations for flexible attestation. In: STC '06: Proceedings, First ACM Workshop on Scalable Trusted Computing, pp. 17-20. ACM Press, New York, NY, USA (2006).
-
(2006)
STC '06: Proceedings, First ACM Workshop on Scalable Trusted Computing
, pp. 17-20
-
-
Katsuno, Y.1
Watanabe, Y.2
Yoshihama, S.3
Mishina, T.4
Kudoh, M.5
-
20
-
-
78751681870
-
Advanced tactic targeted grocer: 'Malware' stole Hannaford data
-
18 March
-
Kerber, R.: Advanced tactic targeted grocer: 'Malware' stole Hannaford data. The Boston Globe, p. 1, 18 March (2008).
-
(2008)
The Boston Globe
, pp. 1
-
-
Kerber, R.1
-
21
-
-
72249120603
-
SeL4: Formal verification of an OS kernel
-
Big Sky, MT, October
-
Klein, G., Elphinstone, K., Heiser, G., Andronick, J., Cock, D., Derrin, P., Elkaduwe, D., Engelhardt, K., Kolanski, R., Norrish, M., Sewell, T., Tuch, H., Winwood, S.: seL4: Formal verification of an OS kernel. In: ACM Symposium on Operating Systems Principles, Big Sky, MT, October (2009).
-
(2009)
ACM Symposium on Operating Systems Principles
-
-
Klein, G.1
Elphinstone, K.2
Heiser, G.3
Andronick, J.4
Cock, D.5
Derrin, P.6
Elkaduwe, D.7
Engelhardt, K.8
Kolanski, R.9
Norrish, M.10
Sewell, T.11
Tuch, H.12
Winwood, S.13
-
22
-
-
79959566693
-
Realizing property-based attestation and sealing with commonly available hard- and software
-
ACM, New York, NY, USA
-
Kühn, U., Selhorst, M., Stüble, C.: Realizing property-based attestation and sealing with commonly available hard- and software. In: STC '07: Proceedings of the 2007 ACM workshop on Scalable Trusted Computing, pp. 50-57. ACM, New York, NY, USA (2007).
-
(2007)
STC '07: Proceedings of the 2007 ACM workshop on Scalable Trusted Computing
, pp. 50-57
-
-
Kühn, U.1
Selhorst, M.2
Stüble, C.3
-
23
-
-
79959553321
-
Linux kernel integrity measurement using contextual inspection
-
ACM, New York, NY, USA
-
Loscocco, P. A., Wilson, P. W., Pendergrass, J. A., McDonell, C. D.: Linux kernel integrity measurement using contextual inspection. In: STC '07: Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing, pp. 21-29. ACM, New York, NY, USA (2007).
-
(2007)
STC '07: Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing
, pp. 21-29
-
-
Loscocco, P.A.1
Wilson, P.W.2
Pendergrass, J.A.3
McDonell, C.D.4
-
24
-
-
79957516348
-
-
The SMV system
-
McMillan, K.: (1992) The SMV system. http://www. kenmcmil. com.
-
(1992)
-
-
McMillan, K.1
-
25
-
-
79957459765
-
Call by Contract for Cryptographic Protocol
-
Millen, J., Guttman, J., Ramsdell, J., Sheehy, J., Sniffen, B.: Call by Contract for Cryptographic Protocol. In: FCS-ARSPA (2006) http://www. mitre. org/work/tech_papers/tech_papers_06/06_0498/index. html.
-
(2006)
FCS-ARSPA
-
-
Millen, J.1
Guttman, J.2
Ramsdell, J.3
Sheehy, J.4
Sniffen, B.5
-
26
-
-
70449667269
-
Analysis of a measured launch
-
June
-
Millen, J., Guttman, J., Ramsdell, J., Sheehy, J., Sniffen, B.: Analysis of a measured launch. Technical report, The MITRE Corporation, June (2007) http://www. mitre. org/work/tech_papers/tech_papers_07/07_0843/index. html.
-
(2007)
Technical report, The MITRE Corporation
-
-
Millen, J.1
Guttman, J.2
Ramsdell, J.3
Sheehy, J.4
Sniffen, B.5
-
27
-
-
79959534782
-
Trust management for trusted computing platforms in web services
-
ACM, New York, NY, USA
-
Nagarajan, A., Varadharajan, V., Hitchens, M.: Trust management for trusted computing platforms in web services. In: STC '07: Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing, pp. 58-62. ACM, New York, NY, USA (2007).
-
(2007)
STC '07: Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing
, pp. 58-62
-
-
Nagarajan, A.1
Varadharajan, V.2
Hitchens, M.3
-
28
-
-
33751027456
-
Computing, signed code and the heat death of the internet
-
ACM Press, New York, NY, USA Trust[ed {pipe} in]
-
Poritz, J. A.: computing, signed code and the heat death of the internet. In: SAC '06: Proceedings of the 2006 ACM Symposium on Applied Computing, pp. 1855-1859. ACM Press, New York, NY, USA (2006) Trust[ed {pipe} in].
-
(2006)
SAC '06: Proceedings of the 2006 ACM Symposium on Applied Computing
, pp. 1855-1859
-
-
Poritz, J.A.1
-
29
-
-
29244450159
-
Property-based attestation for computing platforms: Caring about properties, not mechanisms
-
ACM Press, New York, NY, USA
-
Sadeghi, A.-R., Stüble, C.: Property-based attestation for computing platforms: caring about properties, not mechanisms. In: NSPW '04: Proceedings, 2004 Workshop on New Security Paradigms, pp. 67-77. ACM Press, New York, NY, USA (2004).
-
(2004)
NSPW '04: Proceedings, 2004 Workshop on New Security Paradigms
, pp. 67-77
-
-
Sadeghi, A.-R.1
Stüble, C.2
-
30
-
-
56649102115
-
Property-based tpm virtualization
-
Springer, Berlin, Heidelberg
-
Sadeghi, A.-R., Stüble, C., Winandy, M.: Property-based tpm virtualization. In: ISC '08: Proceedings of the 11th International Conference on Information Security, pp. 1-16. Springer, Berlin, Heidelberg (2008).
-
(2008)
ISC '08: Proceedings of the 11th International Conference on Information Security
, pp. 1-16
-
-
Sadeghi, A.-R.1
Stüble, C.2
Winandy, M.3
-
31
-
-
85084162270
-
Design and implementation of a TCG-based integrity measurement architecture
-
USENIX Association, Berkeley, CA, USA
-
Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and implementation of a TCG-based integrity measurement architecture. In: Proceedings of the 13th USENIX Security Symposium, pp. 16-16. USENIX Association, Berkeley, CA, USA (2004).
-
(2004)
Proceedings of the 13th USENIX Security Symposium
, pp. 16-16
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
van Doorn, L.4
-
32
-
-
39149110948
-
Remote attestation on legacy operating systems with trusted platform modules
-
Schellekens D., Wyseur B., Preneel B.: Remote attestation on legacy operating systems with trusted platform modules. Electron. Notes Theor. Comput. Sci. 197(1), 59-72 (2008).
-
(2008)
Electron. Notes Theor. Comput. Sci.
, vol.197
, Issue.1
, pp. 59-72
-
-
Schellekens, D.1
Wyseur, B.2
Preneel, B.3
-
33
-
-
84885617227
-
Pioneer: verifying integrity and guaranteeing execution of code on legacy platforms
-
October (2005). See also Pioneer Web pages
-
Seshadri, A., Luk, M., Shi, E., Perrig, A., van Doorn, L., Khosla, P.: Pioneer: verifying integrity and guaranteeing execution of code on legacy platforms. In: Proceedings of ACM Symposium on Operating Systems Principles (SOSP), pp. 1-16, October (2005). See also Pioneer Web pages., http://www. cs. cmu. edu.
-
(2005)
Proceedings of ACM Symposium on Operating Systems Principles (SOSP)
, pp. 1-16
-
-
Seshadri, A.1
Luk, M.2
Shi, E.3
Perrig, A.4
van Doorn, L.5
Khosla, P.6
-
35
-
-
84885633990
-
Nexus: A new operating system for trustworthy computing
-
ACM Press, New York, NY, USA
-
Shieh, A., Williams, D., Sirer, E., Schneider, F. B.: Nexus: a new operating system for trustworthy computing. In: SOSP '05: Proceedings of the Twentieth ACM ymposium on Operating Systems Principles, pp. 1-9. ACM Press, New York, NY, USA (2005).
-
(2005)
SOSP '05: Proceedings of the Twentieth ACM ymposium on Operating Systems Principles
, pp. 1-9
-
-
Shieh, A.1
Williams, D.2
Sirer, E.3
Schneider, F.B.4
-
36
-
-
79957525720
-
11 charged in theft of 41 million card numbers
-
p.B 1, 5 August
-
Stone, B.: 11 charged in theft of 41 million card numbers. The New York Times, p. B 1, 5 August (2008).
-
(2008)
The New York Times
-
-
Stone, B.1
-
37
-
-
70349239516
-
Improving coherency of runtime integrity measurement
-
ACM, New York, NY, USA
-
Thober, M., Pendergrass, J. A., McDonell, C. D.: Improving coherency of runtime integrity measurement. In: STC '08: Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, pp. 51-60. ACM, New York, NY, USA (2008).
-
(2008)
STC '08: Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing
, pp. 51-60
-
-
Thober, M.1
Pendergrass, J.A.2
McDonell, C.D.3
-
42
-
-
78649309769
-
Offline untrusted storage with immediate detection of forking and replay attacks
-
ACM, New York, NY, USA
-
van Dijk, M., Rhodes, J., Sarmenta, L. F. G., Devadas, S.: Offline untrusted storage with immediate detection of forking and replay attacks. In: STC '07: Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing, pp. 41-48. ACM, New York, NY, USA (2007).
-
(2007)
STC '07: Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing
, pp. 41-48
-
-
van Dijk, M.1
Rhodes, J.2
Sarmenta, L.F.G.3
Devadas, S.4
|