-
3
-
-
31344435929
-
Cryptographic processors-a survey
-
doi:10.1109/JPROC.2005.862423
-
Anderson, R., Bond, M., Clulow, J., Skorobogatov, S.: Cryptographic processors-a survey. Proceedings of the IEEE 94(2), 357-369 (2006), doi:10.1109/JPROC.2005.862423
-
(2006)
Proceedings of the IEEE
, vol.94
, Issue.2
, pp. 357-369
-
-
Anderson, R.1
Bond, M.2
Clulow, J.3
Skorobogatov, S.4
-
4
-
-
0030672130
-
A secure and reliable bootstrap architecture
-
IEEE Computer Society, Los Alamitos
-
Arbaugh, W.A., Farber, D.J., Smith, J.M.: A secure and reliable bootstrap architecture. In: Proceedings of the 1997 IEEE Symposium on Security and Privacy, p. 65. IEEE Computer Society, Los Alamitos (1997)
-
(1997)
Proceedings of the 1997 IEEE Symposium on Security and Privacy
, pp. 65
-
-
Arbaugh, W.A.1
Farber, D.J.2
Smith, J.M.3
-
5
-
-
21644433634
-
Xen and the art of virtualization
-
ACM, New York
-
Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I., Warfield, A.: Xen and the art of virtualization. In: SOSP 2003: Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, pp. 164-177. ACM, New York (2003)
-
(2003)
SOSP 2003: Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
7
-
-
84910156435
-
vTPM: Virtualizing the trusted platform module
-
Berger, S., Cáceres, R., Goldman, K.A., Perez, R., Sailer, R., van Doorn, L.: vTPM: virtualizing the trusted platform module. In: USENIX-SS 2006: Proceedings of the 15th Conference on USENIX Security Symposium, pp. 305-320 (2006)
-
(2006)
USENIX-SS 2006: Proceedings of the 15th Conference on USENIX Security Symposium
, pp. 305-320
-
-
Berger, S.1
Cáceres, R.2
Goldman, K.A.3
Perez, R.4
Sailer, R.5
Van Doorn, L.6
-
8
-
-
54249122693
-
Toctou, traps, and trusted computing
-
Lipp, P., Sadeghi, A.-R., Koch, K.-M. (eds.) Trust 2008. Springer, Heidelberg
-
Bratus, S., D'Cunha, N., Sparks, E., Smith, S.W.: Toctou, traps, and trusted computing. In: Lipp, P., Sadeghi, A.-R., Koch, K.-M. (eds.) Trust 2008. LNCS, vol. 4968, pp. 14-32. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4968
, pp. 14-32
-
-
Bratus, S.1
D'Cunha, N.2
Sparks, E.3
Smith, S.W.4
-
9
-
-
77954967466
-
Trusted integrity measurement and reporting for virtualized platforms
-
Chen, L., Yung, M. (eds.) INTRUST 2009. Springer, Heidelberg
-
Cabuk, S., Chen, L., Plaquin, D., Ryan, M.: Trusted integrity measurement and reporting for virtualized platforms. In: Chen, L., Yung, M. (eds.) INTRUST 2009. LNCS, vol. 6163, pp. 180-196. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6163
, pp. 180-196
-
-
Cabuk, S.1
Chen, L.2
Plaquin, D.3
Ryan, M.4
-
10
-
-
77953836480
-
Reincarnating pcs with portable soulpads
-
ACM, Seattle
-
Cáceres, R., Carter, C., Narayanaswami, C., Raghunath, M.: Reincarnating pcs with portable soulpads. In: Proceedings of the 3rd International Conference on Mobile Systems, Applications, and Services, pp. 65-78. ACM, Seattle (2005)
-
(2005)
Proceedings of the 3rd International Conference on Mobile Systems, Applications, and Services
, pp. 65-78
-
-
Cáceres, R.1
Carter, C.2
Narayanaswami, C.3
Raghunath, M.4
-
11
-
-
77954970860
-
Trusted virtual domains - Design, implementation and lessons learned
-
Chen, L., Yung, M. (eds.) INTRUST 2009. Springer, Heidelberg
-
Catuogno, L., Dmitrienko, A., Eriksson, K., Kuhlmann, D., Ramunno, G., Sadeghi, A.R., Schulz, S., Schunter, M., Winandy, M., Zhan, J.: Trusted virtual domains - design, implementation and lessons learned. In: Chen, L., Yung, M. (eds.) INTRUST 2009. LNCS, vol. 6163, pp. 156-179. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6163
, pp. 156-179
-
-
Catuogno, L.1
Dmitrienko, A.2
Eriksson, K.3
Kuhlmann, D.4
Ramunno, G.5
Sadeghi, A.R.6
Schulz, S.7
Schunter, M.8
Winandy, M.9
Zhan, J.10
-
12
-
-
48649110347
-
Establishing and sustaining system integrity via root of trust installation
-
Clair, L.S., Schiffman, J., Jaeger, T., McDaniel, P.: Establishing and sustaining system integrity via root of trust installation. In: Computer Security Applications Conference, Annual, pp. 19-29 (2007)
-
(2007)
Computer Security Applications Conference, Annual
, pp. 19-29
-
-
Clair, L.S.1
Schiffman, J.2
Jaeger, T.3
McDaniel, P.4
-
13
-
-
57049135781
-
Attestation: Evidence and trust
-
Chen, L., Ryan, M.D., Wang, G. (eds.) ICICS 2008. Springer, Heidelberg
-
Coker, G., Guttman, J., Loscocco, P., Sheehy, J., Sniffen, B.: Attestation: Evidence and trust. In: Chen, L., Ryan, M.D., Wang, G. (eds.) ICICS 2008. LNCS, vol. 5308, pp. 1-18. Springer, Heidelberg (2008), http://dx.doi.org/10.1007/ 978-3-540-88625-9-1
-
(2008)
LNCS
, vol.5308
, pp. 1-18
-
-
Coker, G.1
Guttman, J.2
Loscocco, P.3
Sheehy, J.4
Sniffen, B.5
-
15
-
-
0035474388
-
Building the ibm 4758 secure coprocessor
-
Dyer, J., Lindemann, M., Perez, R., Sailer, R., van Doorn, L., Smith, S.: Building the ibm 4758 secure coprocessor. Computer 34(10), 57-66 (2001)
-
(2001)
Computer
, vol.34
, Issue.10
, pp. 57-66
-
-
Dyer, J.1
Lindemann, M.2
Perez, R.3
Sailer, R.4
Van Doorn, L.5
Smith, S.6
-
17
-
-
0042349623
-
A trusted open platform
-
England, P., Lampson, B., Manferdelli, J., Willman, B.: A trusted open platform. Computer 36(7), 55-62 (2003)
-
(2003)
Computer
, vol.36
, Issue.7
, pp. 55-62
-
-
England, P.1
Lampson, B.2
Manferdelli, J.3
Willman, B.4
-
18
-
-
54249143197
-
Practical techniques for operating system attestation
-
Lipp, P., Sadeghi, A.-R., Koch, K.-M. (eds.) Trust 2008. Springer, Heidelberg
-
England, P.: Practical techniques for operating system attestation. In: Lipp, P., Sadeghi, A.-R., Koch, K.-M. (eds.) Trust 2008. LNCS, vol. 4968, pp. 1-13. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4968
, pp. 1-13
-
-
England, P.1
-
19
-
-
50249106637
-
-
Tech. rep., Institute for Computer Languages, Theory and Logic Group, Vienna University of Technology
-
Fruhwirth, C.: New methods in hard disk encryption. Tech. rep., Institute for Computer Languages, Theory and Logic Group, Vienna University of Technology (2005), http://clemens.endorphin.org/publications
-
(2005)
New Methods in Hard Disk Encryption
-
-
Fruhwirth, C.1
-
20
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
ACM, New York October
-
Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., Boneh, D.: Terra: A virtual machine-based platform for trusted computing. In: Proceedings of the 19th Symposium on Operating System Principles(SOSP 2003), pp. 193-206. ACM, New York (October 2003)
-
(2003)
Proceedings of the 19th Symposium on Operating System Principles(SOSP 2003)
, pp. 193-206
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
25
-
-
79952099148
-
-
Intel Corporation
-
Intel Corporation: Trusted Boot (2008), http://sourceforge.net/projects/ tboot/
-
(2008)
Trusted Boot
-
-
-
28
-
-
54049158076
-
kvm: The Linux Virtual Machine Monitor
-
Kivity, A., Kamay, V., Laor, D., Lublin, U., Liguori, A.: kvm: the Linux Virtual Machine Monitor. In: OLS 2007: Proceedings of the Linux Symposium, pp. 225-230 (2007)
-
(2007)
OLS 2007: Proceedings of the Linux Symposium
, pp. 225-230
-
-
Kivity, A.1
Kamay, V.2
Laor, D.3
Lublin, U.4
Liguori, A.5
-
29
-
-
21644470487
-
-
Tech. rep., Department of Computer Science/Dartmouth PKI Lab, Dartmouth College
-
Marchesini, J., Smith, S., Wild, O., MacDonald, R.: Experimenting with tcpa/tcg hardware, or: How i learned to stop worrying and love the bear. Tech. rep., Department of Computer Science/Dartmouth PKI Lab, Dartmouth College (2003)
-
(2003)
Experimenting with Tcpa/tcg Hardware, Or: How I Learned to Stop Worrying and Love the Bear
-
-
Marchesini, J.1
Smith, S.2
Wild, O.3
MacDonald, R.4
-
30
-
-
77955186544
-
TrustVisor: Efficient TCB reduction and attestation
-
McCune, J.M., Li, Y., Qu, N., Zhou, Z., Datta, A., Gligor, V., Perrig, A.: TrustVisor: Efficient TCB reduction and attestation. In: Proceedings of the IEEE Symposium on Security and Privacy (May 2010)
-
Proceedings of the IEEE Symposium on Security and Privacy (May 2010)
-
-
McCune, J.M.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.6
Perrig, A.7
-
31
-
-
55149108173
-
Flicker: An execution infrastructure for tcb minimization
-
ACM, Glasgow
-
McCune, J.M., Parno, B.J., Perrig, A., Reiter, M.K., Isozaki, H.: Flicker: an execution infrastructure for tcb minimization. In: Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems 2008, pp. 315-328. ACM, Glasgow (2008)
-
(2008)
Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems 2008
, pp. 315-328
-
-
McCune, J.M.1
Parno, B.J.2
Perrig, A.3
Reiter, M.K.4
Isozaki, H.5
-
33
-
-
0013347999
-
-
Pfitzmann, B., Riordan, J., Stueble, C., Waidner, M., Weber, A., Saarlandes, U.D.: The perseus system architecture (2001)
-
(2001)
The Perseus System Architecture
-
-
Pfitzmann, B.1
Riordan, J.2
Stueble, C.3
Waidner, M.4
Weber, A.5
Saarlandes, U.D.6
-
34
-
-
70350641893
-
-
Pirker, M., Toegl, R., Winkler, T., Vejda, T.: Trusted computing for the JavaTMplatform (2009), http://trustedjava.sourceforge.net/
-
(2009)
Trusted Computing for the JavaTMplatform
-
-
Pirker, M.1
Toegl, R.2
Winkler, T.3
Vejda, T.4
-
35
-
-
77952359310
-
Towards a virtual trusted platform
-
Pirker, M., Toegl, R.: Towards a virtual trusted platform. Journal of Universal Computer Science 16(4), 531-542 (2010), http://www.jucs.org/jucs-16-4/ towards-a-virtual-trusted
-
(2010)
Journal of Universal Computer Science
, vol.16
, Issue.4
, pp. 531-542
-
-
Pirker, M.1
Toegl, R.2
-
36
-
-
77954737988
-
Dynamic enforcement of platform integrity
-
a short paper. Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. Springer, Heidelberg
-
Pirker, M., Toegl, R., Gissing, M.: Dynamic enforcement of platform integrity (a short paper). In: Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. LNCS, vol. 6101, pp. 265-272. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6101
, pp. 265-272
-
-
Pirker, M.1
Toegl, R.2
Gissing, M.3
-
37
-
-
0016082273
-
Formal requirements for virtualizable third generation architectures
-
Popek, G.J., Goldberg, R.P.: Formal requirements for virtualizable third generation architectures. Commun. ACM 17(7), 412-421 (1974)
-
(1974)
Commun. ACM
, vol.17
, Issue.7
, pp. 412-421
-
-
Popek, G.J.1
Goldberg, R.P.2
-
40
-
-
29244450159
-
Property-based attestation for computing platforms: Caring about properties, not mechanisms
-
Hempelmann, C., Raskin, V. (eds.) ACM, New York
-
Sadeghi, A.R., Stüble, C.: Property-based attestation for computing platforms: caring about properties, not mechanisms. In: Hempelmann, C., Raskin, V. (eds.) NSPW, pp. 67-77. ACM, New York (2004)
-
(2004)
NSPW
, pp. 67-77
-
-
Sadeghi, A.R.1
Stüble, C.2
-
41
-
-
21644467261
-
Take control of tcpa
-
Safford, D., Kravitz, J., Doorn, L.v.: Take control of tcpa. Linux Journal (112), 2 (2003), http://domino.research.ibm.com/comm/research-projects. nsf/pages/gsal.TCG.html
-
(2003)
Linux Journal
, Issue.112
, pp. 2
-
-
Safford, D.1
Kravitz, J.2
Doorn, L.V.3
-
42
-
-
85084162270
-
Design and implementation of a TCG-based integrity measurement architecture
-
Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and implementation of a TCG-based integrity measurement architecture. In: Proceedings of the 13th USENIX Security Symposium, USENIX Association, San Diego (2004)
-
Proceedings of the 13th USENIX Security Symposium, USENIX Association, San Diego (2004)
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
Van Doorn, L.4
-
43
-
-
51849091963
-
Tpm virtualization: Building a general framework
-
Pohlmann, N., Reimer, H. (eds.) Vieweg
-
Scarlata, V., Rozas, C., Wiseman, M., Grawrock, D., Vishik, C.: Tpm virtualization: Building a general framework. In: Pohlmann, N., Reimer, H. (eds.) Trusted Computing, pp. 43-56. Vieweg (2007)
-
(2007)
Trusted Computing
, pp. 43-56
-
-
Scarlata, V.1
Rozas, C.2
Wiseman, M.3
Grawrock, D.4
Vishik, C.5
-
44
-
-
77950793589
-
Justifying integrity using a virtual machine verifier
-
IEEE Computer Society, Washington, DC, USA
-
Schiffman, J., Moyer, T., Shal, C., Jaeger, T., McDaniel, P.: Justifying integrity using a virtual machine verifier. In: ACSAC 2009: Proceedings of the 2009 Annual Computer Security Applications Conference, pp. 83-92. IEEE Computer Society, Washington, DC, USA (2009)
-
(2009)
ACSAC 2009: Proceedings of the 2009 Annual Computer Security Applications Conference
, pp. 83-92
-
-
Schiffman, J.1
Moyer, T.2
Shal, C.3
Jaeger, T.4
McDaniel, P.5
-
45
-
-
27544477855
-
Bind: A fine-grained attestation service for secure distributed systems
-
Shi, E., Perrig, A., Van Doorn, L.: Bind: a fine-grained attestation service for secure distributed systems. In: 2005 IEEE Symposium on Security and Privacy, pp. 154-168 (2005)
-
(2005)
2005 IEEE Symposium on Security and Privacy
, pp. 154-168
-
-
Shi, E.1
Perrig, A.2
Van Doorn, L.3
-
46
-
-
34748842601
-
Reducing TCB complexity for security-sensitive applications: Three case studies
-
ACM, New York
-
Singaravelu, L., Pu, C., Härtig, H., Helmuth, C.: Reducing TCB complexity for security-sensitive applications: three case studies. In: EuroSys 2006: Proceedings of the ACM SIGOPS/EuroSys European Conference on Computer Systems 2006, pp. 161-174. ACM, New York (2006)
-
(2006)
EuroSys 2006: Proceedings of the ACM SIGOPS/EuroSys European Conference on Computer Systems 2006
, pp. 161-174
-
-
Singaravelu, L.1
Pu, C.2
Härtig, H.3
Helmuth, C.4
-
49
-
-
77954408441
-
-
Trusted Computing Group: version 1.2 revision 103
-
Trusted Computing Group: TCG TPM specification version 1.2 revision 103 (2007)
-
(2007)
TCG TPM Specification
-
-
-
51
-
-
77954726625
-
Requirements for an Integrity-Protected Hypervisor on the x86 Hardware Virtualized Architecture
-
Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. Springer, Heidelberg
-
Vasudevan, A., McCune, J.M., Qu, N., van Doorn, L., Perrig, A.: Requirements for an Integrity-Protected Hypervisor on the x86 Hardware Virtualized Architecture. In: Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. LNCS, vol. 6101, pp. 141-165. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6101
, pp. 141-165
-
-
Vasudevan, A.1
McCune, J.M.2
Qu, N.3
Van Doorn, L.4
Perrig, A.5
|