Model-based behavioral attestation
Proceedings of the 13th ACM symposium on Access control models and technologies
Remote attestation on program execution
Proceedings of the 3rd ACM workshop on Scalable trusted computing
Remote attestation on function execution (work-in-progress)
INTRUST'09 Proceedings of the First international conference on Trusted Systems
Analysis of existing remote attestation techniques
Security and Communication Networks
Design and implementation of an efficient framework for behaviour attestation using n-call slides
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication
Hi-index | 0.00 |
Remote attestation is a focus research in Trusted Computing. There are some attestation approaches suggested such as configuration based or property based attestation, but these suggestions have a few fatal deficiencies to overcome, e.g., leakage of platform configuration privacy or hard to define trustworthiness related properties, etc.. To solve these problems, this paper presents a system behavior based attestation model which try to determine the trust state of attesting platform from its system trustworthiness related behaviors. The new attestation model has advantages of privacy protection and high feasibility. In addition, system behavior based attestation can also be used to effectively constrain impacts caused by malicious code such as Trojan and virus which are common in today's organization business systems.