Linux Journal
A secure and reliable bootstrap architecture
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
BIND: A Fine-Grained Attestation Service for Secure Distributed Systems
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
Reincarnating PCs with portable SoulPads
Proceedings of the 3rd international conference on Mobile systems, applications, and services
Design and implementation of a TCG-based integrity measurement architecture
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Flicker: an execution infrastructure for tcb minimization
Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems 2008
OSLO: improving the security of trusted computing
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Secure Virtual Disk Images for Grid Computing
APTC '08 Proceedings of the 2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference
Dynamics of a Trusted Platform: A Building Block Approach
Dynamics of a Trusted Platform: A Building Block Approach
LaLa: a late launch application
Proceedings of the 2009 ACM workshop on Scalable trusted computing
acTvSM: a dynamic virtualization platform for enforcement of application integrity
INTRUST'10 Proceedings of the Second international conference on Trusted Systems
A hijacker's guide to the LPC bus
EuroPKI'11 Proceedings of the 8th European conference on Public Key Infrastructures, Services, and Applications
Specification and Standardization of a Java Trusted Computing API
Software—Practice & Experience
Lightweight distributed heterogeneous attested android clouds
TRUST'12 Proceedings of the 5th international conference on Trust and Trustworthy Computing
A hijacker's guide to communication interfaces of the trusted platform module
Computers & Mathematics with Applications
Hi-index | 0.00 |
Modern Trusted Computing platforms offer the basic hardware building blocks to allow effective enforcement of software integrity. In this paper we present a practical software system architecture which uses Intel's late launch mechanism to boot a known-good configuration. We restrict the access to data and execution of services to trusted platform configurations, enforcing the integrity of contained applications as specified by the platform operator. Further, we also describe a set of operational procedures to allow flexible and dynamic configuration management. We present our prototype implementation which integrates well with established Linux distributions.