메뉴 건너뛰기




Volumn 6802 LNCS, Issue , 2011, Pages 326-345

acTvSM: A dynamic virtualization platform for enforcement of application integrity

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATION EXECUTION; DYNAMIC CONFIGURATION; HARDWARE MECHANISM; LINUX DISTRIBUTIONS; OPERATIONAL PROCEDURES; PRACTICAL SYSTEMS; PROTOTYPE IMPLEMENTATIONS; SOFTWARE CONFIGURATION; TRUSTED COMPUTING; VIRTUALIZATIONS;

EID: 82055200280     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-25283-9_22     Document Type: Conference Paper
Times cited : (13)

References (51)
  • 3
    • 31344435929 scopus 로고    scopus 로고
    • Cryptographic processors-a survey
    • doi:10.1109/JPROC.2005.862423
    • Anderson, R., Bond, M., Clulow, J., Skorobogatov, S.: Cryptographic processors-a survey. Proceedings of the IEEE 94(2), 357-369 (2006), doi:10.1109/JPROC.2005.862423
    • (2006) Proceedings of the IEEE , vol.94 , Issue.2 , pp. 357-369
    • Anderson, R.1    Bond, M.2    Clulow, J.3    Skorobogatov, S.4
  • 8
    • 54249122693 scopus 로고    scopus 로고
    • Toctou, traps, and trusted computing
    • Lipp, P., Sadeghi, A.-R., Koch, K.-M. (eds.) Trust 2008. Springer, Heidelberg
    • Bratus, S., D'Cunha, N., Sparks, E., Smith, S.W.: Toctou, traps, and trusted computing. In: Lipp, P., Sadeghi, A.-R., Koch, K.-M. (eds.) Trust 2008. LNCS, vol. 4968, pp. 14-32. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4968 , pp. 14-32
    • Bratus, S.1    D'Cunha, N.2    Sparks, E.3    Smith, S.W.4
  • 9
    • 77954967466 scopus 로고    scopus 로고
    • Trusted integrity measurement and reporting for virtualized platforms
    • Chen, L., Yung, M. (eds.) INTRUST 2009. Springer, Heidelberg
    • Cabuk, S., Chen, L., Plaquin, D., Ryan, M.: Trusted integrity measurement and reporting for virtualized platforms. In: Chen, L., Yung, M. (eds.) INTRUST 2009. LNCS, vol. 6163, pp. 180-196. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6163 , pp. 180-196
    • Cabuk, S.1    Chen, L.2    Plaquin, D.3    Ryan, M.4
  • 11
    • 77954970860 scopus 로고    scopus 로고
    • Trusted virtual domains - Design, implementation and lessons learned
    • Chen, L., Yung, M. (eds.) INTRUST 2009. Springer, Heidelberg
    • Catuogno, L., Dmitrienko, A., Eriksson, K., Kuhlmann, D., Ramunno, G., Sadeghi, A.R., Schulz, S., Schunter, M., Winandy, M., Zhan, J.: Trusted virtual domains - design, implementation and lessons learned. In: Chen, L., Yung, M. (eds.) INTRUST 2009. LNCS, vol. 6163, pp. 156-179. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6163 , pp. 156-179
    • Catuogno, L.1    Dmitrienko, A.2    Eriksson, K.3    Kuhlmann, D.4    Ramunno, G.5    Sadeghi, A.R.6    Schulz, S.7    Schunter, M.8    Winandy, M.9    Zhan, J.10
  • 13
    • 57049135781 scopus 로고    scopus 로고
    • Attestation: Evidence and trust
    • Chen, L., Ryan, M.D., Wang, G. (eds.) ICICS 2008. Springer, Heidelberg
    • Coker, G., Guttman, J., Loscocco, P., Sheehy, J., Sniffen, B.: Attestation: Evidence and trust. In: Chen, L., Ryan, M.D., Wang, G. (eds.) ICICS 2008. LNCS, vol. 5308, pp. 1-18. Springer, Heidelberg (2008), http://dx.doi.org/10.1007/ 978-3-540-88625-9-1
    • (2008) LNCS , vol.5308 , pp. 1-18
    • Coker, G.1    Guttman, J.2    Loscocco, P.3    Sheehy, J.4    Sniffen, B.5
  • 18
    • 54249143197 scopus 로고    scopus 로고
    • Practical techniques for operating system attestation
    • Lipp, P., Sadeghi, A.-R., Koch, K.-M. (eds.) Trust 2008. Springer, Heidelberg
    • England, P.: Practical techniques for operating system attestation. In: Lipp, P., Sadeghi, A.-R., Koch, K.-M. (eds.) Trust 2008. LNCS, vol. 4968, pp. 1-13. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4968 , pp. 1-13
    • England, P.1
  • 19
    • 50249106637 scopus 로고    scopus 로고
    • Tech. rep., Institute for Computer Languages, Theory and Logic Group, Vienna University of Technology
    • Fruhwirth, C.: New methods in hard disk encryption. Tech. rep., Institute for Computer Languages, Theory and Logic Group, Vienna University of Technology (2005), http://clemens.endorphin.org/publications
    • (2005) New Methods in Hard Disk Encryption
    • Fruhwirth, C.1
  • 25
    • 79952099148 scopus 로고    scopus 로고
    • Intel Corporation
    • Intel Corporation: Trusted Boot (2008), http://sourceforge.net/projects/ tboot/
    • (2008) Trusted Boot
  • 35
    • 77952359310 scopus 로고    scopus 로고
    • Towards a virtual trusted platform
    • Pirker, M., Toegl, R.: Towards a virtual trusted platform. Journal of Universal Computer Science 16(4), 531-542 (2010), http://www.jucs.org/jucs-16-4/ towards-a-virtual-trusted
    • (2010) Journal of Universal Computer Science , vol.16 , Issue.4 , pp. 531-542
    • Pirker, M.1    Toegl, R.2
  • 36
    • 77954737988 scopus 로고    scopus 로고
    • Dynamic enforcement of platform integrity
    • a short paper. Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. Springer, Heidelberg
    • Pirker, M., Toegl, R., Gissing, M.: Dynamic enforcement of platform integrity (a short paper). In: Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. LNCS, vol. 6101, pp. 265-272. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6101 , pp. 265-272
    • Pirker, M.1    Toegl, R.2    Gissing, M.3
  • 37
    • 0016082273 scopus 로고
    • Formal requirements for virtualizable third generation architectures
    • Popek, G.J., Goldberg, R.P.: Formal requirements for virtualizable third generation architectures. Commun. ACM 17(7), 412-421 (1974)
    • (1974) Commun. ACM , vol.17 , Issue.7 , pp. 412-421
    • Popek, G.J.1    Goldberg, R.P.2
  • 40
    • 29244450159 scopus 로고    scopus 로고
    • Property-based attestation for computing platforms: Caring about properties, not mechanisms
    • Hempelmann, C., Raskin, V. (eds.) ACM, New York
    • Sadeghi, A.R., Stüble, C.: Property-based attestation for computing platforms: caring about properties, not mechanisms. In: Hempelmann, C., Raskin, V. (eds.) NSPW, pp. 67-77. ACM, New York (2004)
    • (2004) NSPW , pp. 67-77
    • Sadeghi, A.R.1    Stüble, C.2
  • 41
    • 21644467261 scopus 로고    scopus 로고
    • Take control of tcpa
    • Safford, D., Kravitz, J., Doorn, L.v.: Take control of tcpa. Linux Journal (112), 2 (2003), http://domino.research.ibm.com/comm/research-projects. nsf/pages/gsal.TCG.html
    • (2003) Linux Journal , Issue.112 , pp. 2
    • Safford, D.1    Kravitz, J.2    Doorn, L.V.3
  • 43
    • 51849091963 scopus 로고    scopus 로고
    • Tpm virtualization: Building a general framework
    • Pohlmann, N., Reimer, H. (eds.) Vieweg
    • Scarlata, V., Rozas, C., Wiseman, M., Grawrock, D., Vishik, C.: Tpm virtualization: Building a general framework. In: Pohlmann, N., Reimer, H. (eds.) Trusted Computing, pp. 43-56. Vieweg (2007)
    • (2007) Trusted Computing , pp. 43-56
    • Scarlata, V.1    Rozas, C.2    Wiseman, M.3    Grawrock, D.4    Vishik, C.5
  • 49
    • 77954408441 scopus 로고    scopus 로고
    • Trusted Computing Group: version 1.2 revision 103
    • Trusted Computing Group: TCG TPM specification version 1.2 revision 103 (2007)
    • (2007) TCG TPM Specification
  • 51
    • 77954726625 scopus 로고    scopus 로고
    • Requirements for an Integrity-Protected Hypervisor on the x86 Hardware Virtualized Architecture
    • Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. Springer, Heidelberg
    • Vasudevan, A., McCune, J.M., Qu, N., van Doorn, L., Perrig, A.: Requirements for an Integrity-Protected Hypervisor on the x86 Hardware Virtualized Architecture. In: Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. LNCS, vol. 6101, pp. 141-165. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6101 , pp. 141-165
    • Vasudevan, A.1    McCune, J.M.2    Qu, N.3    Van Doorn, L.4    Perrig, A.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.