-
2
-
-
84889055581
-
-
Atmel. tinyAVR homepage. http://www.atmel.com/tinyavr/, 2013.
-
(2013)
TinyAVR Homepage
-
-
-
4
-
-
70449640065
-
A logic of secure systems and its application to trusted computing
-
A. Datta, J. Franklin, D. Garg, and D. Kaynar. A logic of secure systems and its application to trusted computing. In Security and Privacy, 2009 30th IEEE Symposium on, 2009.
-
Security and Privacy, 2009 30th IEEE Symposium On, 2009
-
-
Datta, A.1
Franklin, J.2
Garg, D.3
Kaynar, D.4
-
8
-
-
84889044251
-
-
Cryptology ePrint Archive, Report 2012/713
-
A. Francillon, Q. Nguyen, K. B. Rasmussen, and G. Tsudik. Systematic treatment of remote attestation. Cryptology ePrint Archive, Report 2012/713, 2012. http://eprint.iacr.org/.
-
(2012)
Systematic Treatment of Remote Attestation
-
-
Francillon, A.1
Nguyen, Q.2
Rasmussen, K.B.3
Tsudik, G.4
-
9
-
-
84889034724
-
-
Technical report, Carnegie Mellon University
-
J. Franklin, M. Luk, A. Seshadri, and A. Perrig. PRISM: Human-verifieable code execution. Technical report, Carnegie Mellon University, 2007.
-
(2007)
PRISM: Human-verifieable Code Execution
-
-
Franklin, J.1
Luk, M.2
Seshadri, A.3
Perrig, A.4
-
10
-
-
70450253602
-
Detecting code alteration by creating a temporary memory bottleneck
-
R. W. Gardner, S. Garera, and A. D. Rubin. Detecting code alteration by creating a temporary memory bottleneck. Trans. Info. For. Sec., 4(4):638-650, 2009.
-
(2009)
Trans. Info. For. Sec.
, vol.4
, Issue.4
, pp. 638-650
-
-
Gardner, R.W.1
Garera, S.2
Rubin, A.D.3
-
13
-
-
84889007372
-
Alien vs. Quine, the vanishing circuit and other tales from the industry's crypt
-
Springer, Invited Talk
-
V. Gratzer and D. Naccache. Alien vs. Quine, the vanishing circuit and other tales from the industry's crypt. In Advances in Cryptology - EUROCRYPT. Springer, 2007. Invited Talk.
-
(2007)
Advances in Cryptology - EUROCRYPT
-
-
Gratzer, V.1
Naccache, D.2
-
15
-
-
85028170979
-
Establishing the genuinity of remote computer systems
-
USENIX
-
R. Kennell and L. H. Jamieson. Establishing the genuinity of remote computer systems. In USENIX Security Symposium. USENIX, 2003.
-
(2003)
USENIX Security Symposium
-
-
Kennell, R.1
Jamieson, L.H.2
-
16
-
-
84878354800
-
New results for Timing-Based attestation
-
IEEE
-
X. Kovah, C. Kallenberg, C. Weathers, A. Herzog, M. Albin, and J. Butterworth. New results for Timing-Based attestation. In Security and Privacy (S&P). IEEE, 2012.
-
(2012)
Security and Privacy (S&P)
-
-
Kovah, X.1
Kallenberg, C.2
Weathers, C.3
Herzog, A.4
Albin, M.5
Butterworth, J.6
-
20
-
-
56349171224
-
Remote attestation on legacy operating systems with Trusted Platform Modules
-
D. Schellekens, B. Wyseur, and B. Preneel. Remote attestation on legacy operating systems with Trusted Platform Modules. Sci. Comput. Program., 74(1-2):13-22, 2008.
-
(2008)
Sci. Comput. Program.
, vol.74
, Issue.1-2
, pp. 13-22
-
-
Schellekens, D.1
Wyseur, B.2
Preneel, B.3
-
22
-
-
34247361254
-
SCUBA: Secure code update by attestation in sensor networks
-
ACM
-
A. Seshadri, M. Luk, A. Perrig, L. van Doorn, and P. Khosla. SCUBA: Secure code update by attestation in sensor networks. In Workshop on Wireless security (WiSe). ACM, 2006.
-
(2006)
Workshop on Wireless Security (WiSe)
-
-
Seshadri, A.1
Luk, M.2
Perrig, A.3
Van Doorn, L.4
Khosla, P.5
-
23
-
-
33748537883
-
Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms
-
ACM
-
A. Seshadri, M. Luk, E. Shi, A. Perrig, L. van Doorn, and P. Khosla. Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms. In Symposium on Operating Systems Principles (SOSP). ACM, 2005.
-
(2005)
Symposium on Operating Systems Principles (SOSP)
-
-
Seshadri, A.1
Luk, M.2
Shi, E.3
Perrig, A.4
Van Doorn, L.5
Khosla, P.6
-
28
-
-
80053625618
-
-
Trusted Computing Group (TCG) Version 1.2
-
Trusted Computing Group (TCG). TPM Main Specification, Version 1.2, 2011.
-
(2011)
TPM Main Specification
-
-
-
29
-
-
84871997733
-
CARMA: A hardware tamper-resistant isolated execution environment on commodity x86 platforms
-
ACM
-
A. Vasudevan, J. Mccune, J. Newsome, A. Perrig, and L. V. Doorn. CARMA: A hardware tamper-resistant isolated execution environment on commodity x86 platforms. In ACM Symposium on Information, Computer and Communications Security (AsiaCCS). ACM, 2012.
-
(2012)
ACM Symposium on Information, Computer and Communications Security (AsiaCCS)
-
-
Vasudevan, A.1
Mccune, J.2
Newsome, J.3
Perrig, A.4
Doorn, L.V.5
-
30
-
-
84888989370
-
-
Wikipedia. AES instruction set. http://en.wikipedia.org/wiki/AES- instruction-set, 2013.
-
(2013)
AES Instruction Set
-
-
-
31
-
-
79956031885
-
A software-based root-of-trust primitive on multicore platforms
-
ACM
-
Q. Yan, J. Han, Y. Li, R. H. Deng, and T. Li. A software-based root-of-trust primitive on multicore platforms. In ACM Symposium on Information, Computer and Communications Security (AsiaCCS). ACM, 2011.
-
(2011)
ACM Symposium on Information, Computer and Communications Security (AsiaCCS)
-
-
Yan, Q.1
Han, J.2
Li, Y.3
Deng, R.H.4
Li, T.5
|