Towards Provably-Secure Remote Memory Attestation
暂无分享,去创建一个
[1] Adrian Perrig,et al. SBAP: Software-Based Attestation for Peripherals , 2010, TRUST.
[2] Adrian Perrig,et al. TrustVisor: Efficient TCB Reduction and Attestation , 2010, 2010 IEEE Symposium on Security and Privacy.
[3] A. One,et al. Smashing The Stack For Fun And Profit , 1996 .
[4] Adrian Perrig,et al. VIPER: verifying the integrity of PERipherals' firmware , 2011, CCS '11.
[5] Emmett Witchel,et al. InkTag: secure applications on an untrusted operating system , 2013, ASPLOS '13.
[6] Ran Canetti,et al. The random oracle methodology, revisited , 2000, JACM.
[7] David Cash,et al. Cryptography Secure Against Related-Key Attacks and Tampering , 2011, IACR Cryptol. ePrint Arch..
[8] Wouter Joosen,et al. Efficient Protection Against Heap-Based Buffer Overflows Without Resorting to Magic , 2006, ICICS.
[9] Ronald Cramer,et al. A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack , 1998, CRYPTO.
[10] Hovav Shacham,et al. On the effectiveness of address-space randomization , 2004, CCS '04.
[11] Markus Jakobsson,et al. Practical and Secure Software-Based Attestation , 2011, 2011 Workshop on Lightweight Security & Privacy: Devices, Protocols, and Applications.
[12] Ittai Anati,et al. Innovative Technology for CPU Based Attestation and Sealing , 2013 .
[13] Mihir Bellare,et al. A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs, and Applications , 2003, EUROCRYPT.
[14] Elaine Shi,et al. Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems , 2005, SOSP '05.
[15] Derek Bruening,et al. AddressSanitizer: A Fast Address Sanity Checker , 2012, USENIX Annual Technical Conference.
[16] Claudio Soriente,et al. On the difficulty of software-based attestation of embedded devices , 2009, CCS.
[17] Michael K. Reiter,et al. Flicker: an execution infrastructure for tcb minimization , 2008, Eurosys '08.
[18] Juan del Cuvillo,et al. Using innovative instructions to create trustworthy software solutions , 2013, HASP '13.
[19] Benjamin Morin,et al. What If You Can't Trust Your Network Card? , 2011, RAID.
[20] Pradeep K. Khosla,et al. SWATT: softWare-based attestation for embedded devices , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[21] Xeno Kovah,et al. New Results for Timing-Based Attestation , 2012, 2012 IEEE Symposium on Security and Privacy.
[22] Frederik Armknecht,et al. A security framework for the analysis and design of software attestation , 2013, CCS.
[23] E. Berger. HeapShield : Library-Based Heap Overflow Protection for Free , 2006 .
[24] Navjot Singh,et al. Transparent Run-Time Defense Against Stack-Smashing Attacks , 2000, USENIX Annual Technical Conference, General Track.
[25] Rishiraj Bhattacharyya,et al. Secure Message Authentication Against Related-Key Attack , 2013, FSE.
[26] Christopher Krügel,et al. Run-time Detection of Heap-based Overflows , 2003, LISA.
[27] Wouter Joosen,et al. HeapSentry: Kernel-Assisted Protection against Heap Overflows , 2013, DIMVA.
[28] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.
[29] Carlos V. Rozas,et al. Innovative instructions and software model for isolated execution , 2013, HASP '13.
[30] David Pointcheval,et al. REACT: Rapid Enhanced-Security Asymmetric Cryptosystem Transform , 2001, CT-RSA.
[31] Victor Shoup,et al. Public Key Encryption , 2011, Encyclopedia of Cryptography and Security.
[32] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[33] Hugo Krawczyk,et al. Proactive Secret Sharing Or: How to Cope With Perpetual Leakage , 1995, CRYPTO.
[34] Michael Shuey,et al. StackGhost: Hardware Facilitated Stack Protection , 2001, USENIX Security Symposium.
[35] David Pointcheval,et al. Public-key encryption indistinguishable under plaintext-checkable attacks , 2016, IET Inf. Secur..
[36] Victor Shoup,et al. Sequences of games: a tool for taming complexity in security proofs , 2004, IACR Cryptol. ePrint Arch..
[37] Mihir Bellare,et al. The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs , 2006, EUROCRYPT.
[38] Kenneth G. Paterson,et al. RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures , 2012, IACR Cryptol. ePrint Arch..