Secure bootstrap is not enough: shoring up the trusted computing base
暂无分享,去创建一个
[1] Butler W. Lampson,et al. A Trusted Open Platform , 2003, Computer.
[2] Craig A. N. Soules,et al. Metadata Efficiency in Versioning File Systems , 2003, FAST.
[3] 尚弘 島影. National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .
[4] Trent Jaeger,et al. Design and Implementation of a TCG-based Integrity Measurement Architecture , 2004, USENIX Security Symposium.
[5] Pankaj Rohatgi,et al. EMpowering Side-Channel Attacks , 2001, IACR Cryptology ePrint Archive.
[6] Dan Boneh,et al. Architectural support for copy and tamper resistant software , 2000, SIGP.
[7] G. Edward Suh,et al. AEGIS: architecture for tamper-evident and tamper-resistant processing , 2003, ICS.
[8] G. Edward Suh,et al. AEGIS: architecture for tamper-evident and tamper-resistant processing , 2003 .
[9] William A. Arbaugh,et al. A secure and reliable bootstrap architecture , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).