Architectural support for copy and tamper resistant software
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
Valuation of Trust in Open Networks
ESORICS '94 Proceedings of the Third European Symposium on Research in Computer Security
Modelling a Public-Key Infrastructure
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
A Predicate Calculus Logic for the PKI Trust Model Analysis
NCA '01 Proceedings of the IEEE International Symposium on Network Computing and Applications (NCA'01)
Terra: a virtual machine-based platform for trusted computing
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
A probabilistic trust model for handling inaccurate reputation sources
iTrust'05 Proceedings of the Third international conference on Trust Management
Modeling TCG-Based secure systems with colored petri nets
INTRUST'10 Proceedings of the Second international conference on Trusted Systems
Hi-index | 0.00 |
The stated goal of the trusted computing is to redesign PC hardware for providing protection against software attack. Trust platform is key technology of trusted computing. However, the security of trusted platform should be verified in theory, and the model of trusted platform should be further improved. In this paper, a formal method for verifying the security of trusted platform is presented. The vulnerability of secure bootstrap is analyzed based on the proposed formal semantics. Moreover, an improved model of secure bootstrap is proposed. The semantics presented here also can be used to reasoning about other applications of trusted computing, which provides a general and effective method for analyzing security of trusted computing applications.