메뉴 건너뛰기




Volumn 7163 LNCS, Issue , 2012, Pages 176-193

A hijacker's guide to the LPC bus

Author keywords

[No Author keywords available]

Indexed keywords

ACTIVE ATTACK; BUS COMMUNICATIONS; CHAIN OF TRUST; COMMUNICATION MECHANISMS; INEXPENSIVE EQUIPMENT; PASSIVE ATTACKS; TAMPER RESISTANT; TRUSTED PLATFORM MODULE;

EID: 84861447765     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-29804-2_12     Document Type: Conference Paper
Times cited : (12)

References (22)
  • 1
    • 84861438045 scopus 로고    scopus 로고
    • Amd64 architecture programmer's manual
    • publication No. 24593; Revision 3.14
    • AMD: Amd64 architecture programmer's manual. System programming, vol. 2 (2007), http://www.amd.com/us-en/assets/content type/ white papers and tech docs/24593.pdf, publication No. 24593; Revision 3.14
    • (2007) System Programming , vol.2
  • 2
    • 77953274755 scopus 로고    scopus 로고
    • Attack, Solution and Verification for Shared Authorisation Data in TCG TPM
    • Degano, P., Guttman, J.D. (eds.) FAST 2009. Springer, Heidelberg
    • Chen, L., Ryan, M.: Attack, Solution and Verification for Shared Authorisation Data in TCG TPM. In: Degano, P., Guttman, J.D. (eds.) FAST 2009. LNCS, vol. 5983, pp. 201-216. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.5983 , pp. 201-216
    • Chen, L.1    Ryan, M.2
  • 4
    • 84861422686 scopus 로고    scopus 로고
    • Intel trusted execution technology
    • document Number: 315168-005
    • Corp., I.: Intel trusted execution technology. software development guide (2008), http://download.intel.com/technology/security/downloads/315168.pdf, document Number: 315168-005
    • (2008) Software Development Guide
  • 6
    • 70749096362 scopus 로고    scopus 로고
    • TPM Working Group: Specification available online at: specification version 1.2 Level 2 Revision 103
    • TCG Group, TPM Working Group: TPM Main Part 1 Design Principles (July 9, 2007), Specification available online at: http://www.trustedcomputinggroup.org/ files/resource files/ ACD19914-1D09-3519-ADA64741A1A15795/mainP1DPrev103.zip, specification version 1.2 Level 2 Revision 103
    • (2007) TPM Main Part 1 Design Principles July 9
  • 10
    • 85077706009 scopus 로고    scopus 로고
    • OSLO: Improving the security of trusted computing
    • USENIX Association, Berkeley
    • Kauer, B.: OSLO: improving the security of trusted computing. In: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, pp. 16:1-16:9. USENIX Association, Berkeley (2007), http://portal.acm.org/citation. cfm?id=1362903.1362919
    • (2007) Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
    • Kauer, B.1
  • 11
    • 77954729866 scopus 로고    scopus 로고
    • Introducing the Trusted Virtual Environment Module: A New Mechanism for Rooting Trust in Cloud Computing
    • Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. Springer, Heidelberg doi:10.1007/978-3-642-13869-0 14
    • Krautheim, F., Phatak, D., Sherman, A.: Introducing the Trusted Virtual Environment Module: A New Mechanism for Rooting Trust in Cloud Computing. In: Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. LNCS, vol. 6101, pp. 211-227. Springer, Heidelberg (2010), http://dx.doi.org/10.1007/978-3-642- 13869-0-14, doi:10.1007/978-3-642-13869-0 14
    • (2010) LNCS , vol.6101 , pp. 211-227
    • Krautheim, F.1    Phatak, D.2    Sherman, A.3
  • 12
    • 79952940177 scopus 로고    scopus 로고
    • Blog posting archived at
    • Lawson, N.: TPM hardware attacks (part 2), Blog posting archived at: http://rdist.root.org/2007/07/17/tpm-hardware-attacks-part-2/
    • TPM Hardware Attacks (Part 2)
    • Lawson, N.1
  • 13
    • 84861453868 scopus 로고    scopus 로고
    • Spartan-3e evaluation kit from avnet
    • Avnet electronics marketing: Product folder available online at: product annoncement of ADS-XLX-SP3EEVL100 board in
    • Avnet electronics marketing: Spartan-3e evaluation kit from avnet, Product folder available online at: http://www.xilinx.com/publications/ xcellonline/ xcell 53/xc pdf/xc avnet53.pdf, product annoncement of ADS-XLX-SP3EEVL100 board in Xilinx Xcell Journal Issue #53
    • Xilinx Xcell Journal , Issue.53
  • 15
    • 77954737988 scopus 로고    scopus 로고
    • Dynamic Enforcement of Platform Integrity
    • Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. Springer, Heidelberg doi:10.1007/978-3-642-13869-0
    • Pirker, M., Toegl, R., Gissing, M.: Dynamic Enforcement of Platform Integrity. In: Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. LNCS, vol. 6101, pp. 265-272. Springer, Heidelberg (2010), http://dx.doi.org/10. 1007/978-3-642-13869-0-18, doi:10.1007/978-3-642-13869-0 18
    • (2010) LNCS , vol.6101 , Issue.18 , pp. 265-272
    • Pirker, M.1    Toegl, R.2    Gissing, M.3
  • 17
    • 43649103310 scopus 로고    scopus 로고
    • Tech. rep., Department of Computer Science, Dartmouth College, Hanover, NH 03755, USA June 28
    • Sparks, E.R.: A Security Assessment of Trusted Platform Modules. Tech. rep., Department of Computer Science, Dartmouth College, Hanover, NH 03755, USA (June 28, 2007)
    • (2007) A Security Assessment of Trusted Platform Modules
    • Sparks, E.R.1
  • 19
    • 84861449124 scopus 로고    scopus 로고
    • presentation archived at
    • Tarnovsky, C.: Hacking the Smartcard Chip, presentation archived at: http://www.blackhat.com/html/bh-dc-10/bh-dc-10-archives.html#Tarnovsky
    • Hacking the Smartcard Chip
    • Tarnovsky, C.1
  • 20
    • 21644486314 scopus 로고    scopus 로고
    • revision 1.4 August 2
    • Trusted Compuring Group: TCG Specification Architecture Overview, revision 1.4 (August 2, 2007), http://www.trustedcomputinggroup.org/
    • (2007) TCG Specification Architecture Overview
  • 21
    • 70449668809 scopus 로고    scopus 로고
    • version 1.2 FINAL. For TPM Family 1.2; Level 2 July 11
    • Trusted Computing Group: TCG PC Client Specific TPM Interface Specification (TIS), version 1.2 FINAL. For TPM Family 1.2; Level 2 (July 11, 2005), http://www.trustedcomputinggroup.org/
    • (2005) TCG PC Client Specific TPM Interface Specification (TIS)
  • 22
    • 84874114852 scopus 로고    scopus 로고
    • Eavesdropping Trusted Platform Module Communication
    • July presented at Slides and report are available online at
    • Winter, J.: Eavesdropping Trusted Platform Module Communication (July 2009), presented at 4th European Trusted Infrastructure Summerschool (ETISS) (2009), Slides and report are available online at: http://embedded.iaik.tugraz. at/
    • (2009) 4th European Trusted Infrastructure Summerschool (ETISS) (2009)
    • Winter, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.