A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Linux Security Modules: General Security Support for the Linux Kernel
Proceedings of the 11th USENIX Security Symposium
The UCONABC usage control model
ACM Transactions on Information and System Security (TISSEC)
Property-based attestation for computing platforms: caring about properties, not mechanisms
NSPW '04 Proceedings of the 2004 workshop on New security paradigms
PRIMA: policy-reduced integrity measurement architecture
Proceedings of the eleventh ACM symposium on Access control models and technologies
A protocol for property-based attestation
Proceedings of the first ACM workshop on Scalable trusted computing
An Efficient Attestation for Trustworthiness of Computing Platform
IIH-MSP '06 Proceedings of the 2006 International Conference on Intelligent Information Hiding and Multimedia
Design and implementation of a TCG-based integrity measurement architecture
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Semantic remote attestation: a virtual machine directed approach to trusted computing
VM'04 Proceedings of the 3rd conference on Virtual Machine Research And Technology Symposium - Volume 3
Model-based behavioral attestation
Proceedings of the 13th ACM symposium on Access control models and technologies
When good instructions go bad: generalizing return-oriented programming to RISC
Proceedings of the 15th ACM conference on Computer and communications security
Remote attestation on program execution
Proceedings of the 3rd ACM workshop on Scalable trusted computing
Hi-index | 0.00 |
This paper has been written as a part of the research project that is working towards the implementation of dynamic behavioral attestation for mobile platforms. The motivation behind this paper was to analyze the existing remote attestation techniques in order to figure out their strengths and weaknesses. We have analyzed Integrity Measurement Architecture, Policy-reduced Integrity Measurement Architecture, Property-based Attestation, Remote Attestation on Program Execution, Semantic Remote Attestation, Trustable Remote Verification of Web Services, and Model-based Behavior Attestation. Each of the existing remote attestation techniques was found to be effective in some situations but was found to be infeasible in others. Therefore, a new remote attestation technique is needed, which is platform independent and flexible enough to meet the challenges of today's scalable computing environments. Copyright © 2011 John Wiley & Sons, Ltd.