The Byzantine Generals Problem
ACM Transactions on Programming Languages and Systems (TOPLAS)
Certifying program execution with secure processors
HOTOS'03 Proceedings of the 9th conference on Hot Topics in Operating Systems - Volume 9
Tamper resistance: a cautionary note
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Attack-resistant trust metrics for public key certification
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Offline untrusted storage with immediate detection of forking and replay attacks
Proceedings of the 2007 ACM workshop on Scalable trusted computing
Aegis: A Single-Chip Secure Processor
IEEE Design & Test
Cell broadband engine processor vault security architecture
IBM Journal of Research and Development
Verifying security properties in electronic voting machines
Verifying security properties in electronic voting machines
Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems
The Trusted Execution Module: Commodity General-Purpose Trusted Computing
CARDIS '08 Proceedings of the 8th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Secret-Ballot Receipts: True Voter-Verifiable Elections
IEEE Security and Privacy
T-DRE: a hardware trusted computing base for direct recording electronic vote machines
Proceedings of the 26th Annual Computer Security Applications Conference
FORTUNA-A framework for the design and development of hardware-based secure systems
Journal of Systems and Software
Hi-index | 0.01 |
Many high security applications rely ultimately on the security of hardware-based solutions in order to protect both data and code against tampering. For these applications, assuring the device's identity and integrity is paramount. In our work, we explore a number of factors that help to improve on device accreditation, by devising and defining both architectural and procedural requirements related to device construction, shipping and usage. Based on that, we proposed two integrity shared verification schemes which enable regular and auditing users of such applications to promptly and easily verify whether their interfacing hardware is trustworthy. We implemented our solutions in a key application, namely a hardware security module (HSM) suitable for use in supporting PKIs and also showed how it performs equally well in Direct Recording Electronic (DRE) voting machines.