-
1
-
-
84861438045
-
Amd64 architecture programmer's manual
-
publication No. 24593; Revision 3.14
-
AMD: Amd64 architecture programmer's manual. System programming, vol. 2 (2007), http://www.amd.com/us-en/assets/content type/ white papers and tech docs/24593.pdf, publication No. 24593; Revision 3.14
-
(2007)
System Programming
, vol.2
-
-
-
2
-
-
77953274755
-
Attack, Solution and Verification for Shared Authorisation Data in TCG TPM
-
Degano, P., Guttman, J.D. (eds.) FAST 2009. Springer, Heidelberg
-
Chen, L., Ryan, M.: Attack, Solution and Verification for Shared Authorisation Data in TCG TPM. In: Degano, P., Guttman, J.D. (eds.) FAST 2009. LNCS, vol. 5983, pp. 201-216. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.5983
, pp. 201-216
-
-
Chen, L.1
Ryan, M.2
-
4
-
-
84861422686
-
Intel trusted execution technology
-
document Number: 315168-005
-
Corp., I.: Intel trusted execution technology. software development guide (2008), http://download.intel.com/technology/security/downloads/315168.pdf, document Number: 315168-005
-
(2008)
Software Development Guide
-
-
-
6
-
-
70749096362
-
-
TPM Working Group: Specification available online at: specification version 1.2 Level 2 Revision 103
-
TCG Group, TPM Working Group: TPM Main Part 1 Design Principles (July 9, 2007), Specification available online at: http://www.trustedcomputinggroup.org/ files/resource files/ ACD19914-1D09-3519-ADA64741A1A15795/mainP1DPrev103.zip, specification version 1.2 Level 2 Revision 103
-
(2007)
TPM Main Part 1 Design Principles July 9
-
-
-
7
-
-
66149173689
-
Lest we remember: Cold-boot attacks on encryption keys
-
Halderman, J.A., Schoen, S.D., Heninger, N., Clarkson, W., Paul, W., Calandrino, J.A., Feldman, A.J., Appelbaum, J., Felten, E.W.: Lest we remember: cold-boot attacks on encryption keys. Commun. ACM 52(5), 91-98 (2009)
-
(2009)
Commun. ACM
, vol.52
, Issue.5
, pp. 91-98
-
-
Halderman, J.A.1
Schoen, S.D.2
Heninger, N.3
Clarkson, W.4
Paul, W.5
Calandrino, J.A.6
Feldman, A.J.7
Appelbaum, J.8
Felten, E.W.9
-
10
-
-
85077706009
-
OSLO: Improving the security of trusted computing
-
USENIX Association, Berkeley
-
Kauer, B.: OSLO: improving the security of trusted computing. In: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, pp. 16:1-16:9. USENIX Association, Berkeley (2007), http://portal.acm.org/citation. cfm?id=1362903.1362919
-
(2007)
Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
-
-
Kauer, B.1
-
11
-
-
77954729866
-
Introducing the Trusted Virtual Environment Module: A New Mechanism for Rooting Trust in Cloud Computing
-
Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. Springer, Heidelberg doi:10.1007/978-3-642-13869-0 14
-
Krautheim, F., Phatak, D., Sherman, A.: Introducing the Trusted Virtual Environment Module: A New Mechanism for Rooting Trust in Cloud Computing. In: Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. LNCS, vol. 6101, pp. 211-227. Springer, Heidelberg (2010), http://dx.doi.org/10.1007/978-3-642- 13869-0-14, doi:10.1007/978-3-642-13869-0 14
-
(2010)
LNCS
, vol.6101
, pp. 211-227
-
-
Krautheim, F.1
Phatak, D.2
Sherman, A.3
-
12
-
-
79952940177
-
-
Blog posting archived at
-
Lawson, N.: TPM hardware attacks (part 2), Blog posting archived at: http://rdist.root.org/2007/07/17/tpm-hardware-attacks-part-2/
-
TPM Hardware Attacks (Part 2)
-
-
Lawson, N.1
-
13
-
-
84861453868
-
Spartan-3e evaluation kit from avnet
-
Avnet electronics marketing: Product folder available online at: product annoncement of ADS-XLX-SP3EEVL100 board in
-
Avnet electronics marketing: Spartan-3e evaluation kit from avnet, Product folder available online at: http://www.xilinx.com/publications/ xcellonline/ xcell 53/xc pdf/xc avnet53.pdf, product annoncement of ADS-XLX-SP3EEVL100 board in Xilinx Xcell Journal Issue #53
-
Xilinx Xcell Journal
, Issue.53
-
-
-
14
-
-
55149108173
-
Flicker: An execution infrastructure for tcb minimization
-
ACM, New York
-
McCune, J.M., Parno, B.J., Perrig, A., Reiter, M.K., Isozaki, H.: Flicker: an execution infrastructure for tcb minimization. In: Proceedings of the 3rd ACM SIGOPS/ EuroSys European Conference on Computer Systems, Eurosys 2008, pp. 315- 328. ACM, New York (2008), http://doi.acm.org/10.1145/1352592. 1352625
-
(2008)
Proceedings of the 3rd ACM SIGOPS/ EuroSys European Conference on Computer Systems, Eurosys 2008
, pp. 315-328
-
-
McCune, J.M.1
Parno, B.J.2
Perrig, A.3
Reiter, M.K.4
Isozaki, H.5
-
15
-
-
77954737988
-
Dynamic Enforcement of Platform Integrity
-
Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. Springer, Heidelberg doi:10.1007/978-3-642-13869-0
-
Pirker, M., Toegl, R., Gissing, M.: Dynamic Enforcement of Platform Integrity. In: Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. LNCS, vol. 6101, pp. 265-272. Springer, Heidelberg (2010), http://dx.doi.org/10. 1007/978-3-642-13869-0-18, doi:10.1007/978-3-642-13869-0 18
-
(2010)
LNCS
, vol.6101
, Issue.18
, pp. 265-272
-
-
Pirker, M.1
Toegl, R.2
Gissing, M.3
-
17
-
-
43649103310
-
-
Tech. rep., Department of Computer Science, Dartmouth College, Hanover, NH 03755, USA June 28
-
Sparks, E.R.: A Security Assessment of Trusted Platform Modules. Tech. rep., Department of Computer Science, Dartmouth College, Hanover, NH 03755, USA (June 28, 2007)
-
(2007)
A Security Assessment of Trusted Platform Modules
-
-
Sparks, E.R.1
-
19
-
-
84861449124
-
-
presentation archived at
-
Tarnovsky, C.: Hacking the Smartcard Chip, presentation archived at: http://www.blackhat.com/html/bh-dc-10/bh-dc-10-archives.html#Tarnovsky
-
Hacking the Smartcard Chip
-
-
Tarnovsky, C.1
-
20
-
-
21644486314
-
-
revision 1.4 August 2
-
Trusted Compuring Group: TCG Specification Architecture Overview, revision 1.4 (August 2, 2007), http://www.trustedcomputinggroup.org/
-
(2007)
TCG Specification Architecture Overview
-
-
-
21
-
-
70449668809
-
-
version 1.2 FINAL. For TPM Family 1.2; Level 2 July 11
-
Trusted Computing Group: TCG PC Client Specific TPM Interface Specification (TIS), version 1.2 FINAL. For TPM Family 1.2; Level 2 (July 11, 2005), http://www.trustedcomputinggroup.org/
-
(2005)
TCG PC Client Specific TPM Interface Specification (TIS)
-
-
-
22
-
-
84874114852
-
Eavesdropping Trusted Platform Module Communication
-
July presented at Slides and report are available online at
-
Winter, J.: Eavesdropping Trusted Platform Module Communication (July 2009), presented at 4th European Trusted Infrastructure Summerschool (ETISS) (2009), Slides and report are available online at: http://embedded.iaik.tugraz. at/
-
(2009)
4th European Trusted Infrastructure Summerschool (ETISS) (2009)
-
-
Winter, J.1
|