메뉴 건너뛰기




Volumn , Issue , 2012, Pages 616-630

Building verifiable trusted path on commodity x86 computers

Author keywords

Device Input Output; Hypervisor; Isolation; Trusted Path; Trustworthy Computing

Indexed keywords

HAND HELD COMPUTERS; TRUSTED COMPUTING;

EID: 84878350874     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2012.42     Document Type: Conference Paper
Times cited : (110)

References (65)
  • 1
    • 51849104627 scopus 로고    scopus 로고
    • TrustZone: Integrated Hardware and Software Security
    • T. Alves and D. Felton. TrustZone : Integrated Hardware and Software Security. ARM white paper, 2004.
    • (2004) ARM White Paper
    • Alves, T.1    Felton, D.2
  • 2
    • 85175129478 scopus 로고    scopus 로고
    • AMD I/O virtualization technology (IOMMU) specification
    • AMD. rev. 1.26
    • AMD. AMD I/O virtualization technology (IOMMU) specification. AMD Pub. no. 34434 rev. 1.26, 2009.
    • (2009) AMD Pub. No. 34434
  • 3
    • 84867518815 scopus 로고    scopus 로고
    • System Programming
    • AMD. Pub. no. 24593 rev. 3.20
    • AMD. AMD 64 Architecture Programmer's Manual: Volume 2: System Programming. Pub. no. 24593 rev. 3.20, 2011.
    • (2011) AMD 64 Architecture Programmer's Manual , vol.2
  • 5
    • 0016873760 scopus 로고
    • Penetrating an operating system: A study of VM/370 integrity
    • C. R. Attanasio, P. W. Markstein, and R. J. Phillips. Penetrating an operating system: a study of VM/370 integrity. IBM System Journal, 15(1):102-116, 1976.
    • (1976) IBM System Journal , vol.15 , Issue.1 , pp. 102-116
    • Attanasio, C.R.1    Markstein, P.W.2    Phillips, R.J.3
  • 7
    • 84878356074 scopus 로고    scopus 로고
    • BAE Systems Information Technology LLC. Version 1.11 for XTS-400, Version 6
    • BAE Systems Information Technology LLC. Security Target, Version 1.11 for XTS-400, Version 6, 2004.
    • (2004) Security Target
  • 13
    • 81255158767 scopus 로고    scopus 로고
    • The end-to-end argument and application design: The role of trust
    • D. D. Clark and M. S. Blumenthal. The end-to-end argument and application design: the role of trust. Federal Communications Law Journal, 63(2):357-390, 2011.
    • (2011) Federal Communications Law Journal , vol.63 , Issue.2 , pp. 357-390
    • Clark, D.D.1    Blumenthal, M.S.2
  • 15
    • 0003765587 scopus 로고    scopus 로고
    • Common Criteria for Information Technology Security Evaluation (CC). Version 3.1 CCMB-2009-07-004
    • Common Criteria for Information Technology Security Evaluation (CC). Common methodology for information technology security evaluation. Version 3.1 CCMB-2009-07-004, 2009.
    • (2009) Common Methodology for Information Technology Security Evaluation
  • 23
    • 85175129641 scopus 로고    scopus 로고
    • Accessing PCI Express configuration registers using Intel chipsets
    • S. Fleming. Accessing PCI Express configuration registers using Intel chipsets. Intel White Paper no. 321090, 2008.
    • (2008) Intel White Paper No. 321090
    • Fleming, S.1
  • 25
    • 77955216681 scopus 로고    scopus 로고
    • Scalable parametric verification of secure systems: How to verify reference monitors without worrying about data structure size
    • J. Franklin, S. Chaki, A. Datta, and A. Seshadri. Scalable parametric verification of secure systems: How to verify reference monitors without worrying about data structure size. In Proc. IEEE Symposium on Security and Privacy, 2010.
    • Proc. IEEE Symposium on Security and Privacy, 2010
    • Franklin, J.1    Chaki, S.2    Datta, A.3    Seshadri, A.4
  • 31
    • 72049101360 scopus 로고    scopus 로고
    • HyperTransport Consortium. Doc. no. HTC20051222-0046-0008 rev.3.10
    • HyperTransport Consortium. HyperTransport I/O link specification. Doc. no. HTC20051222-0046-0008 rev.3.10, 2006.
    • (2006) HyperTransport I/O Link Specification
  • 34
    • 85175131048 scopus 로고    scopus 로고
    • Intel virtualization technology for directed I/O architecture specification
    • Intel. rev. 1.3
    • Intel. Intel virtualization technology for directed I/O architecture specification. Intel Pub. no. D51397-005 rev. 1.3, 2011.
    • (2011) Intel Pub. No. D51397-005
  • 37
    • 70350757761 scopus 로고    scopus 로고
    • Usable security: How to get it
    • B. Lampson. Usable security: How to get it. Communications of the ACM, 52(11):25-27, 2009.
    • (2009) Communications of the ACM , vol.52 , Issue.11 , pp. 25-27
    • Lampson, B.1
  • 59
    • 80755188561 scopus 로고    scopus 로고
    • Project Maux Mk.II - "I own the NIC, now I want a shell!"
    • A. Triulzi. Project Maux Mk.II - "I own the NIC, now I want a shell!". In PacSec/core, 2008.
    • (2008) PacSec/core
    • Triulzi, A.1
  • 60
    • 84878369976 scopus 로고    scopus 로고
    • The Jedi Packet Trick takes over the Deathstar (or: "taking NIC backdoors to the next level")
    • A. Triulzi. The Jedi Packet Trick takes over the Deathstar (or: "taking NIC backdoors to the next level"). In CanSecWest/core, 2010.
    • (2010) CanSecWest/core
    • Triulzi, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.