Security verification of hardware-enabled attestation protocols
暂无分享,去创建一个
[1] John Ulrich,et al. Automated Analysis of Cryptographic Protocols Using Mur ' , 1997 .
[2] Sean W. Smith,et al. Building the IBM 4758 Secure Coprocessor , 2001, Computer.
[3] Jaehyuk Huh,et al. Architectural support for secure virtualization under a vulnerable hypervisor , 2011, 2011 44th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO).
[4] Eric Yawei Chen,et al. App isolation: get the security of multiple browsers with just one , 2011, CCS '11.
[5] Shaz Qadeer,et al. Verifying Sequential Consistency on Shared-Memory Multiprocessors by Model Checking , 2001, IEEE Trans. Parallel Distributed Syst..
[6] Adrian Perrig,et al. TrustVisor: Efficient TCB Reduction and Attestation , 2010, 2010 IEEE Symposium on Security and Privacy.
[7] Michael Norrish,et al. seL4: formal verification of an OS kernel , 2009, SOSP '09.
[8] G. Edward Suh,et al. AEGIS: architecture for tamper-evident and tamper-resistant processing , 2003, ICS.
[9] Dan Boneh,et al. Architectural support for copy and tamper resistant software , 2000, SIGP.
[10] Ernest F. Brickell,et al. Direct anonymous attestation , 2004, CCS '04.
[11] Junfeng Yang,et al. Using model checking to find serious file system errors , 2004, TOCS.
[12] Ruby B. Lee,et al. Scalable security architecture for trusted software , 2010 .
[13] Marta Z. Kwiatkowska,et al. PRISM 4.0: Verification of Probabilistic Real-Time Systems , 2011, CAV.
[14] Ruby B. Lee,et al. Architectural support for hypervisor-secure virtualization , 2012, ASPLOS XVII.
[15] Ruby B. Lee,et al. A Case for Hardware Protection of Guest VMs from Compromised Hypervisors in Cloud Computing , 2011, 2011 31st International Conference on Distributed Computing Systems Workshops.
[16] Dawn Xiaodong Song,et al. Towards a Formal Foundation of Web Security , 2010, 2010 23rd IEEE Computer Security Foundations Symposium.
[17] Vitaly Shmatikov,et al. Finite-State Analysis of SSL 3.0 , 1998, USENIX Security Symposium.
[18] Ruby B. Lee,et al. Hardware-rooted trust for secure key management and transient trust , 2007, CCS '07.
[19] Alan J. Hu,et al. Protocol verification as a hardware design aid , 1992, Proceedings 1992 IEEE International Conference on Computer Design: VLSI in Computers & Processors.
[20] Daniel Jackson,et al. Software Abstractions - Logic, Language, and Analysis , 2006 .
[21] John C. Mitchell,et al. Automated analysis of cryptographic protocols using Mur/spl phi/ , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[22] Adrian Perrig,et al. SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes , 2007, SOSP.
[23] Trent Jaeger,et al. Design and Implementation of a TCG-based Integrity Measurement Architecture , 2004, USENIX Security Symposium.
[24] Ruby B. Lee,et al. Scalable architectural support for trusted software , 2010, HPCA - 16 2010 The Sixteenth International Symposium on High-Performance Computer Architecture.
[25] Mark Horowitz,et al. Specifying and verifying hardware for tamper-resistant software , 2003, 2003 Symposium on Security and Privacy, 2003..
[26] Scott A. Rotondo. Trusted Computing Group , 2011, Encyclopedia of Cryptography and Security.
[27] Ruby B. Lee,et al. Architecture for protecting critical secrets in microprocessors , 2005, 32nd International Symposium on Computer Architecture (ISCA'05).
[28] Bart Preneel,et al. Remote attestation on legacy operating systems with trusted platform modules , 2008, Sci. Comput. Program..
[29] Sagar Chaki,et al. Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size , 2010, 2010 IEEE Symposium on Security and Privacy.