Root-of-Trust Abstractions for Symbolic Analysis: Application to Attestation Protocols
暂无分享,去创建一个
Peter Y. A. Ryan | Peter B. Rønne | Liqun Chen | Thanassis Giannetsos | Georgios Fotiadis | José Moreira | Mark D. Ryan | P. Ryan | Liqun Chen | José Moreira | P. B. Rønne | M. D. Ryan | Thanassis Giannetsos | G. Fotiadis
[1] Gavin Lowe,et al. A hierarchy of authentication specifications , 1997, Proceedings 10th Computer Security Foundations Workshop.
[2] Martín Abadi,et al. Mobile values, new names, and secure communication , 2001, POPL '01.
[3] Dengguo Feng,et al. Formal analysis of HMAC authorisation in the TPM2.0 specification , 2018, IET Inf. Secur..
[4] Vincent Cheval,et al. A Little More Conversation, a Little Less Action, a Lot More Satisfaction: Global States in ProVerif , 2018, 2018 IEEE 31st Computer Security Foundations Symposium (CSF).
[5] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.3 , 2018, RFC.
[6] Ralf Sasse,et al. Formal Analysis and Implementation of a TPM 2.0-based Direct Anonymous Attestation Scheme , 2020, AsiaCCS.
[7] James Greene. Intel ® Trusted Execution Technology Hardware-based Technology for Enhancing Server Platform Security , 2013 .
[8] Graham Steel,et al. Formal Analysis of Protocols Based on TPM State Registers , 2011, 2011 IEEE 24th Computer Security Foundations Symposium.
[9] Dengguo Feng,et al. Formal Analysis of Enhanced Authorization in the TPM 2.0 , 2015, AsiaCCS.
[10] Robert Künnemann,et al. Automated Analysis of Security Protocols with Global State , 2014, 2014 IEEE Symposium on Security and Privacy.
[11] Trent Jaeger,et al. Design and Implementation of a TCG-based Integrity Measurement Architecture , 2004, USENIX Security Symposium.
[12] Ronald Perez,et al. Linking remote attestation to secure tunnel endpoints , 2006, STC '06.
[13] Will Arthur,et al. A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security , 2015 .
[14] Ernest F. Brickell,et al. Direct anonymous attestation , 2004, CCS '04.
[15] Mario Werner,et al. SGXIO: Generic Trusted I/O Path for Intel SGX , 2017, CODASPY.
[16] Mark Ryan,et al. StatVerif: Verification of Stateful Processes , 2011, 2011 IEEE 24th Computer Security Foundations Symposium.
[17] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[18] Mark Ryan,et al. Attack, Solution and Verification for Shared Authorisation Data in TCG TPM , 2009, Formal Aspects in Security and Trust.
[19] David A. Basin,et al. The TAMARIN Prover for the Symbolic Analysis of Security Protocols , 2013, CAV.
[20] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.1 , 2006, RFC.
[21] Dengguo Feng,et al. Formal Analysis of DAA-Related APIs in TPM 2.0 , 2015, NSS.
[22] Kenneth A. Goldman,et al. A Practical Guide to TPM 2.0 , 2015, Apress.
[23] Zhou Hongwei,et al. TSGX: Defeating SGX Side Channel Attack with Support of TPM , 2021, 2021 Asia-Pacific Conference on Communications Technology and Computer Science (ACCTCS).