메뉴 건너뛰기




Volumn , Issue , 2013, Pages 1-12

A security framework for the analysis and design of software attestation

Author keywords

keyless crypto; security framework; software attestation

Indexed keywords

DESIGN AND ANALYSIS; DESIGN OF SOFTWARES; GENERIC SOFTWARES; KEYLESS CRYPTO; SECURITY ANALYSIS; SECURITY FRAMEWORKS; SIDE-CHANNEL INFORMATION; SOFTWARE INTEGRITY;

EID: 84889015000     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2508859.2516650     Document Type: Conference Paper
Times cited : (87)

References (32)
  • 2
    • 84889055581 scopus 로고    scopus 로고
    • Atmel. tinyAVR homepage. http://www.atmel.com/tinyavr/, 2013.
    • (2013) TinyAVR Homepage
  • 6
    • 0001126172 scopus 로고
    • Pricing via processing or combatting junk mail
    • Springer
    • C. Dwork and M. Naor. Pricing via processing or combatting junk mail. In Advances in Cryptology - CRYPTO. Springer, 1993.
    • (1993) Advances in Cryptology - CRYPTO
    • Dwork, C.1    Naor, M.2
  • 10
    • 70450253602 scopus 로고    scopus 로고
    • Detecting code alteration by creating a temporary memory bottleneck
    • R. W. Gardner, S. Garera, and A. D. Rubin. Detecting code alteration by creating a temporary memory bottleneck. Trans. Info. For. Sec., 4(4):638-650, 2009.
    • (2009) Trans. Info. For. Sec. , vol.4 , Issue.4 , pp. 638-650
    • Gardner, R.W.1    Garera, S.2    Rubin, A.D.3
  • 12
  • 13
    • 84889007372 scopus 로고    scopus 로고
    • Alien vs. Quine, the vanishing circuit and other tales from the industry's crypt
    • Springer, Invited Talk
    • V. Gratzer and D. Naccache. Alien vs. Quine, the vanishing circuit and other tales from the industry's crypt. In Advances in Cryptology - EUROCRYPT. Springer, 2007. Invited Talk.
    • (2007) Advances in Cryptology - EUROCRYPT
    • Gratzer, V.1    Naccache, D.2
  • 15
    • 85028170979 scopus 로고    scopus 로고
    • Establishing the genuinity of remote computer systems
    • USENIX
    • R. Kennell and L. H. Jamieson. Establishing the genuinity of remote computer systems. In USENIX Security Symposium. USENIX, 2003.
    • (2003) USENIX Security Symposium
    • Kennell, R.1    Jamieson, L.H.2
  • 20
    • 56349171224 scopus 로고    scopus 로고
    • Remote attestation on legacy operating systems with Trusted Platform Modules
    • D. Schellekens, B. Wyseur, and B. Preneel. Remote attestation on legacy operating systems with Trusted Platform Modules. Sci. Comput. Program., 74(1-2):13-22, 2008.
    • (2008) Sci. Comput. Program. , vol.74 , Issue.1-2 , pp. 13-22
    • Schellekens, D.1    Wyseur, B.2    Preneel, B.3
  • 26
    • 85084162788 scopus 로고    scopus 로고
    • Side effects are not sufficient to authenticate software
    • USENIX
    • U. Shankar, M. Chew, and J. D. Tygar. Side effects are not sufficient to authenticate software. In USENIX Security Symposium. USENIX, 2004.
    • (2004) USENIX Security Symposium
    • Shankar, U.1    Chew, M.2    Tygar, J.D.3
  • 28
    • 80053625618 scopus 로고    scopus 로고
    • Trusted Computing Group (TCG) Version 1.2
    • Trusted Computing Group (TCG). TPM Main Specification, Version 1.2, 2011.
    • (2011) TPM Main Specification
  • 30
    • 84888989370 scopus 로고    scopus 로고
    • Wikipedia. AES instruction set. http://en.wikipedia.org/wiki/AES- instruction-set, 2013.
    • (2013) AES Instruction Set


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.