A Retrospective on the VAX VMM Security Kernel
IEEE Transactions on Software Engineering
Authentication in distributed systems: theory and practice
ACM Transactions on Computer Systems (TOCS)
Authenticated Operation of Open Computing Devices
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
A Digital Signature Based on a Conventional Encryption Function
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Computer
Terra: a virtual machine-based platform for trusted computing
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Property-based attestation for computing platforms: caring about properties, not mechanisms
NSPW '04 Proceedings of the 2004 workshop on New security paradigms
Trusted Computing Platforms: TCPA Technology in Context
Trusted Computing Platforms: TCPA Technology in Context
Plutus: Scalable Secure File Sharing on Untrusted Storage
FAST '03 Proceedings of the 2nd USENIX Conference on File and Storage Technologies
A protocol for property-based attestation
Proceedings of the first ACM workshop on Scalable trusted computing
Trusted Computing (Professional Applications of Computing) (Professional Applications of Computing)
Trusted Computing (Professional Applications of Computing) (Professional Applications of Computing)
Semantic remote attestation: a virtual machine directed approach to trusted computing
VM'04 Proceedings of the 3rd conference on Virtual Machine Research And Technology Symposium - Volume 3
Realizing property-based attestation and sealing with commonly available hard- and software
Proceedings of the 2007 ACM workshop on Scalable trusted computing
OSLO: improving the security of trusted computing
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Trust '08 Proceedings of the 1st international conference on Trusted Computing and Trust in Information Technologies: Trusted Computing - Challenges and Applications
EuroPKI'05 Proceedings of the Second European conference on Public Key Infrastructure
Trust '09 Proceedings of the 2nd International Conference on Trusted Computing
Trustworthy Log Reconciliation for Distributed Virtual Organisations
Trust '09 Proceedings of the 2nd International Conference on Trusted Computing
Tagging the Turtle: Local Attestation for Kiosk Computing
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Trusted virtual containers on demand
Proceedings of the fifth ACM workshop on Scalable trusted computing
Group-based attestation: enhancing privacy and management in remote attestation
TRUST'10 Proceedings of the 3rd international conference on Trust and trustworthy computing
An approach to introducing locality in remote attestation using near field communications
The Journal of Supercomputing
Semantic attestation of node integrity in overlays
OTM'10 Proceedings of the 2010 international conference on On the move to meaningful internet systems - Volume Part I
Attestation of integrity of overlay networks
Journal of Systems Architecture: the EUROMICRO Journal
On scalability of remote attestation
Proceedings of the sixth ACM workshop on Scalable trusted computing
acTvSM: a dynamic virtualization platform for enforcement of application integrity
INTRUST'10 Proceedings of the Second international conference on Trusted Systems
Specification and Standardization of a Java Trusted Computing API
Software—Practice & Experience
Hi-index | 0.00 |
This paper describes three practical techniques for authenticating the code and other execution state of an operating system using the services of the TPM and a hypervisor. The techniques trade off detailed reporting of the OS code and configuration with the manageability and comprehensibility of reported configurations. Such trade-offs are essential because of the complexity and diversity of modern general purpose operating systems makes simple code authentication schemes using code hashes or certificates infeasible.