메뉴 건너뛰기




Volumn 05-09-June-2016, Issue , 2016, Pages

Remote attestation for low-end embedded devices: The prover's perspective

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER AIDED DESIGN; ECONOMIC AND SOCIAL EFFECTS; MALWARE;

EID: 84977151375     PISSN: 0738100X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2897937.2898083     Document Type: Conference Paper
Times cited : (51)

References (38)
  • 6
  • 7
    • 70449640065 scopus 로고    scopus 로고
    • A logic of secure systems and its application to trusted computing
    • A. Datta, J. Franklin, D. Garg, and D. Kaynar. A Logic of Secure Systems and its Application to Trusted Computing. In IEEE S and P, 2009
    • (2009) IEEE S and P
    • Datta, A.1    Franklin, J.2    Garg, D.3    Kaynar, D.4
  • 8
    • 85073002683 scopus 로고    scopus 로고
    • SMART: Secure and minimal architecture for (establishing dynamic) root of trust
    • K. E. Defrawy, A. Francillon, D. Perito, and G. Tsudik. SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust. In NDSS, 2012
    • (2012) NDSS
    • Defrawy, K.E.1    Francillon, A.2    Perito, D.3    Tsudik, G.4
  • 11
    • 84977114676 scopus 로고    scopus 로고
    • Girard, Olivier. openMSP430. http://opencores.org/project,openmsp430
    • Girard, Olivier
  • 13
    • 85028170979 scopus 로고    scopus 로고
    • Establishing the genuinity of remote computer systems
    • R. Kennell and L. H. Jamieson. Establishing the Genuinity of Remote Computer Systems. In USENIX Security, 2003
    • (2003) USENIX Security
    • Kennell, R.1    Jamieson, L.H.2
  • 14
    • 70450080729 scopus 로고    scopus 로고
    • Remote attestation to dynamic system properties: Towards providing complete system integrity evidence
    • C. Kil, E. C. Sezer, A. M. Azab, P. Ning, and X. Zhang. Remote Attestation to Dynamic System Properties: Towards Providing Complete System Integrity Evidence. In IEEE/IFIP DSN, 2009
    • (2009) IEEE/IFIP DSN
    • Kil, C.1    Sezer, E.C.2    Azab, A.M.3    Ning, P.4    Zhang, X.5
  • 17
    • 0003196107 scopus 로고    scopus 로고
    • HMAC: Keyed-hashing for message authentication
    • H. Krawczyk, M. Bellare, and R. Canetti. HMAC: Keyed-Hashing for Message Authentication. RFC 2104, 1997
    • (1997) RFC 2104
    • Krawczyk, H.1    Bellare, M.2    Canetti, R.3
  • 18
    • 84928023346 scopus 로고    scopus 로고
    • SBAP: Software-based attestation for peripherals
    • Springer
    • Y. Li, J. M. McCune, and A. Perrig. SBAP: Software-Based Attestation for Peripherals. In TRUST. Springer, 2010
    • (2010) TRUST
    • Li, Y.1    McCune, J.M.2    Perrig, A.3
  • 19
    • 80755144042 scopus 로고    scopus 로고
    • VIPER: Verifying the integrity of peripherals firmware
    • Y. Li, J. M. McCune, and A. Perrig. VIPER: Verifying the Integrity of PERipherals Firmware. In ACM CCS, 2011
    • (2011) ACM CCS
    • Li, Y.1    McCune, J.M.2    Perrig, A.3
  • 22
    • 84903837342 scopus 로고    scopus 로고
    • How low can you go recommendations for hardware-supported minimal TCB code execution
    • J. M. McCune, B. J. Parno, A. Perrig, M. K. Reiter, and A. Seshadri. How Low Can You Go? Recommendations for Hardware-Supported Minimal TCB Code Execution. ACM ASPLOS, 2008
    • (2008) ACM ASPLOS
    • McCune, J.M.1    Parno, B.J.2    Perrig, A.3    Reiter, M.K.4    Seshadri, A.5
  • 23
    • 84953273645 scopus 로고    scopus 로고
    • Remote exploitation of an unaltered passenger vehicle
    • C. Miller and C. Valasek. Remote Exploitation of an Unaltered Passenger Vehicle. In Blackhat USA, 2015
    • (2015) Blackhat USA
    • Miller, C.1    Valasek, C.2
  • 26
    • 84977130552 scopus 로고    scopus 로고
    • Persistent and dynamic trust: Analysis and the related impact of trusted platforms
    • S. Pearson, M. C. Mont, and S. Crane. Persistent and Dynamic Trust: Analysis and the Related Impact of Trusted Platforms. iTrust, 2005
    • (2005) ITrust
    • Pearson, S.1    Mont, M.C.2    Crane, S.3
  • 27
    • 84885876349 scopus 로고    scopus 로고
    • Hacking medical devices for fun and insulin: Breaking the human SCADA system
    • J. Radcliffe. Hacking Medical Devices for Fun and Insulin: Breaking the Human SCADA System. In Blackhat USA, 2011
    • (2011) Blackhat USA
    • Radcliffe, J.1
  • 29
    • 77956129809 scopus 로고    scopus 로고
    • SAKE: Software attestation for key establishment in sensor networks
    • A. Seshadri, M. Luk, and A. Perrig. SAKE: Software Attestation for Key Establishment in Sensor Networks. In IEEE DCOSS. Elsevier, 2008
    • (2008) IEEE DCOSS. Elsevier
    • Seshadri, A.1    Luk, M.2    Perrig, A.3
  • 32
    • 84885617227 scopus 로고    scopus 로고
    • Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems
    • A. Seshadri, M. Luk, E. Shi, A. Perrig, L. Van Doorn, and P. Khosla. Pioneer: Verifying Code Integrity and Enforcing Untampered Code Execution on Legacy Systems. In ACM SIGOPS OSR, 2005
    • (2005) ACM SIGOPS OSR
    • Seshadri, A.1    Luk, M.2    Shi, E.3    Perrig, A.4    Van Doorn, L.5    Khosla, P.6
  • 34
    • 85084162788 scopus 로고    scopus 로고
    • Side effects are not sufficient to authenticate software
    • U. Shankar, M. Chew, and J. D. Tygar. Side effects are not sufficient to authenticate software. In USENIX Security, 2004
    • (2004) USENIX Security
    • Shankar, U.1    Chew, M.2    Tygar, J.D.3
  • 35
    • 84903840167 scopus 로고    scopus 로고
    • Efficient isolation of trusted subsystems in embedded systems
    • Springer
    • R. Strackx, F. Piessens, and B. Preneel. Efficient Isolation of Trusted Subsystems in Embedded Systems. In SecureComm. Springer, 2010
    • (2010) SecureComm
    • Strackx, R.1    Piessens, F.2    Preneel, B.3
  • 38
    • 79956031885 scopus 로고    scopus 로고
    • A software-based root-of-trust primitive on multicore platforms
    • Q. Yan, J. Han, Y. Li, and R. Deng. A Software-Based Root-of-Trust Primitive on Multicore Platforms. In ACM ASIACCS, 2011
    • (2011) ACM ASIACCS
    • Yan, Q.1    Han, J.2    Li, Y.3    Deng, R.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.