메뉴 건너뛰기




Volumn , Issue , 2011, Pages 17-28

Unicorn: Two-factor attestation for data security

Author keywords

Attestation; Authentication; Malware; Phishing; Security token; Trusted computing

Indexed keywords

ATTESTATION; MALWARES; PHISHING; SECURITY TOKENS; TRUSTED COMPUTING;

EID: 80755187832     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2046707.2046712     Document Type: Conference Paper
Times cited : (19)

References (37)
  • 2
    • 78650019783 scopus 로고    scopus 로고
    • HyperSentry: Enabling stealthy in-context measurement of hypervisor integrity
    • Chicago, IL, USA, Oct.
    • A. M. Azab, P. Ning, Z. Wang, X. Jiang, X. Zhang, and N. C. Skalsky. HyperSentry: enabling stealthy in-context measurement of hypervisor integrity. In ACM CCS'10, Chicago, IL, USA, Oct. 2010.
    • (2010) ACM CCS'10
    • Azab, A.M.1    Ning, P.2    Wang, Z.3    Jiang, X.4    Zhang, X.5    Skalsky, N.C.6
  • 3
    • 85084162119 scopus 로고    scopus 로고
    • Hand-held computers can be better smart cards
    • Washington, DC, USA, Aug.
    • D. Balfanz and E. Felten. Hand-held computers can be better smart cards. In USENIX Security Symposium, Washington, DC, USA, Aug. 1999.
    • (1999) USENIX Security Symposium
    • Balfanz, D.1    Felten, E.2
  • 5
    • 78751542940 scopus 로고    scopus 로고
    • Kells: A protection framework for portable data
    • Austin, TX, USA, Dec.
    • K. Butler, S. McLaughlin, and P. McDaniel. Kells: A protection framework for portable data. In ACSAC'10, Austin, TX, USA, Dec. 2010.
    • (2010) ACSAC'10
    • Butler, K.1    Mclaughlin, S.2    Mcdaniel, P.3
  • 7
    • 4444318660 scopus 로고    scopus 로고
    • Terra: A virtual machine-based platform for trusted computing
    • Bolton Landing, NY, USA, Oct.
    • T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: A virtual machine-based platform for trusted computing. In SOSP'03, Bolton Landing, NY, USA, Oct. 2003.
    • (2003) SOSP'03
    • Garfinkel, T.1    Pfaff, B.2    Chow, J.3    Rosenblum, M.4    Boneh, D.5
  • 13
    • 80755145327 scopus 로고    scopus 로고
    • Intel version Oct. 5
    • Intel. Trusted boot. Open-source project (version Oct. 5, 2010). http://sourceforge.net/projects/tboot/.
    • (2010) Trusted Boot
  • 14
    • 85077706009 scopus 로고    scopus 로고
    • OSLO: Improving the security of trusted computing
    • Boston, MA, USA, Aug.
    • B. Kauer. OSLO: Improving the security of trusted computing. In USENIX Security Symposium, Boston, MA, USA, Aug. 2007.
    • (2007) USENIX Security Symposium
    • Kauer, B.1
  • 16
    • 80755186327 scopus 로고    scopus 로고
    • Usability testing a malware-resistant input mechanism
    • San Diego, CA, USA, Feb.
    • A. Libonati, J. M. McCune, and M. K. Reiter. Usability testing a malware-resistant input mechanism. In NDSS'11, San Diego, CA, USA, Feb. 2011.
    • (2011) NDSS'11
    • Libonati, A.1    Mccune, J.M.2    Reiter, M.K.3
  • 17
    • 2442425355 scopus 로고    scopus 로고
    • Integrating flexible support for security policies into the linux operating system
    • Boston, MA, USA, June
    • P. Loscocco and S. Smalley. Integrating flexible support for security policies into the Linux operating system. In USENIX Annual Technical Conference, Boston, MA, USA, June 2001.
    • (2001) USENIX Annual Technical Conference
    • Loscocco, P.1    Smalley, S.2
  • 18
    • 79960801872 scopus 로고    scopus 로고
    • Leveraging personal devices for stronger password authentication from untrusted computers
    • M. Mannan and P. van Oorschot. Leveraging personal devices for stronger password authentication from untrusted computers. Journal of Computer Security, 19(4):703-750, 2011.
    • (2011) Journal of Computer Security , vol.19 , Issue.4 , pp. 703-750
    • Mannan, M.1    Van Oorschot, P.2
  • 21
    • 78650861686 scopus 로고    scopus 로고
    • Safe passage for passwords and other sensitive data
    • San Diego, CA, USA, Feb.
    • J. M. McCune, A. Perrig, and M. K. Reiter. Safe passage for passwords and other sensitive data. In NDSS'09, San Diego, CA, USA, Feb. 2009.
    • (2009) NDSS'09
    • Mccune, J.M.1    Perrig, A.2    Reiter, M.K.3
  • 25
    • 85084162270 scopus 로고    scopus 로고
    • Design and implementation of a TCG-based integrity measurement architecture
    • San Diego, CA, USA, Aug.
    • R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn. Design and implementation of a TCG-based integrity measurement architecture. In USENIX Security Symposium, San Diego, CA, USA, Aug. 2004.
    • (2004) USENIX Security Symposium
    • Sailer, R.1    Zhang, X.2    Jaeger, T.3    Van Doorn, L.4
  • 26
    • 78650002260 scopus 로고    scopus 로고
    • Survivable key compromise in software update systems
    • Chicago, IL, USA, Oct.
    • J. Samuel, N. Mathewson, J. Cappos, and R. Dingledine. Survivable key compromise in software update systems. In ACM CCS'10, Chicago, IL, USA, Oct. 2010.
    • (2010) ACM CCS'10
    • Samuel, J.1    Mathewson, N.2    Cappos, J.3    Dingledine, R.4
  • 27
    • 70449824733 scopus 로고    scopus 로고
    • SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes
    • Stevenson, WA, USA, Oct.
    • A. Seshadri, M. Luk, N. Qu, and A. Perrig. SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. In SOSP'07, Stevenson, WA, USA, Oct. 2007.
    • (2007) SOSP'07
    • Seshadri, A.1    Luk, M.2    Qu, N.3    Perrig, A.4
  • 28
    • 84885633990 scopus 로고    scopus 로고
    • Nexus: A new operating system for trustworthy computing
    • Brighton, UK, Oct.
    • A. Shieh, D. Williams, E. G. Sirer, and F. B. Schneider. Nexus: A new operating system for trustworthy computing. In SOSP'05, Brighton, UK, Oct. 2005.
    • (2005) SOSP'05
    • Shieh, A.1    Williams, D.2    Sirer, E.G.3    Schneider, F.B.4
  • 29
    • 84893275787 scopus 로고    scopus 로고
    • Certified lies: Detecting and defeating government interception attacks against SSL
    • St. Lucia
    • C. Soghoian and S. Stamm. Certified lies: Detecting and defeating government interception attacks against SSL. In Financial Cryptography and Data Security (FC'11), St. Lucia, 2011.
    • (2011) Financial Cryptography and Data Security (FC'11)
    • Soghoian, C.1    Stamm, S.2
  • 30
    • 80755145323 scopus 로고    scopus 로고
    • version 4.1, Sept. 19
    • A squashed read-only file system for Linux. Open-source project (version 4.1, Sept. 19, 2010). http://squashfs.sourceforge.net/.
    • (2010) A Squashed Read-only File System for Linux
  • 31
    • 48649110347 scopus 로고    scopus 로고
    • Establishing and sustaining system integrity via root of trust installation
    • Miami, FL, USA, Dec.
    • L. St. Clair, J. Schiffman, T. Jaeger, and P. McDaniel. Establishing and sustaining system integrity via root of trust installation. In ACSAC'07, Miami, FL, USA, Dec. 2007.
    • (2007) ACSAC'07
    • St. Clair, L.1    Schiffman, J.2    Jaeger, T.3    Mcdaniel, P.4
  • 36
    • 85084161247 scopus 로고    scopus 로고
    • Why johnny can't encrypt: A usability evaluation of PGP 5.0
    • Washington, D.C., USA, Aug.
    • A. Whitten and J. D. Tygar. Why Johnny can't encrypt: A usability evaluation of PGP 5.0. In USENIX Security Symposium, Washington, D.C., USA, Aug. 1999.
    • (1999) USENIX Security Symposium
    • Whitten, A.1    Tygar, J.D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.