[1] “Trusted Computing Group. TCG TPM Specification.
http://www.trustedcomputinggroup.org/.”
[2] D. Akhawe, A. Barth, P. E. Lam, J. Mitchell, and D. Song, “Towards a
Formal Foundation of Web Security,” in Proc. of the Computer Security
Foundations Symposium, ser. CSF, July 2010.
[3] E. Brickell, J. Camenisch, and L. Chen, “Direct anonymous attestation,”
in Proc. of the Conference on Computer and Communications Security,
ser. CCS, Oct. 2004.
[4] D. Champagne, “Scalable security architecture for trusted software,”
Ph.D. dissertation, Princeton University, Electrical Engineering Department,
Princeton, NJ, 2010.
[5] D. Champagne and R. B. Lee, “Processor-based tailored attestation,”
Princeton University Department of Electrical Engineering Technical
Report, Nov. 2010.
[6] D. Champagne and R. Lee, “Scalable architectural support for trusted
software,” in Proc. of the Int. Symposium on High Performance Computer
Architecture, ser. HPCA, Jan. 2010.
[7] E. Y. Chen, J. Bau, C. Reis, A. Barth, and C. Jackson, “App isolation:
get the security of multiple browsers with just one,” in Proc. of the Conf.
on Computer and Communications Security, ser. CCS, Oct. 2011.
[8] D. L. Dill, A. J. Drexler, A. J. Hu, and C. H. Yang, “Protocol verification
as a hardware design aid,” in Proc. of the Int. Conference on Computer
Design: VLSI in Computer & Processors, ser. ICCD, Oct. 1992.
[9] J. S. Dwoskin and R. B. Lee, “Hardware-rooted trust for secure key
management and transient trust,” in Proceedings of the 14th ACM
conference on Computer and communications security, ser. CCS ’07.
New York, NY, USA: ACM, 2007, pp. 389–400. [Online]. Available:
http://doi.acm.org/10.1145/1315245.1315294
[10] J. Dyer, M. Lindemann, R. Perez, R. Sailer, L. van Doorn, and S. Smith,
“Building the IBM 4758 secure coprocessor,” IEEE Computer, Oct.
2001.
[11] J. Franklin, S. Chaki, A. Datta, and A. Seshadri, “Scalable parametric
verification of secure systems: How to verify reference monitors without
worrying about data structure size,” in Proc. of the Symposium on
Security and Privacy, ser. S&P, May 2010.
[12] T. C. Group, TCG PC Specific Implementation Specification, 2003.
[13] D. Jackson, Software Abstractions: Logic, Language, and Analysis.
The MIT Press, 2006.
[14] S. Jin, J. Ahn, S. Cha, and J. Huh, “Architectural Support for Secure Virtualization
under a Vulnerable Hypervisor,” in Proc. of Int. Symposium
on Microarchitecture, ser. MICRO, Dec. 2011.
[15] G. Klein, K. Elphinstone, G. Heiser, J. Andronick, D. Cock, P. Derrin,
D. Elkaduwe, K. Engelhardt, R. Kolanski, M. Norrish et al., “seL4:
Formal verification of an OS kernel,” in Proc. of the Symposium on
Operating Systems Principles, ser. SOSP, Oct. 2009.
[16] M. Kwiatkowska, G. Norman, and D. Parker, “PRISM 4.0: Verification
of probabilistic real-time systems,” in Proc. of the Int. Conference on
Computer Aided Verification, ser. CAV, July 2011.
[17] R. B. Lee, P. C. S. Kwan, J. P. McGregor, J. Dwoskin, and Z. Wang,
“Architecture for protecting critical secrets in microprocessors,”
in Proceedings of the 32nd annual international symposium on
Computer Architecture, ser. ISCA ’05. Washington, DC, USA:
IEEE Computer Society, 2005, pp. 2–13. [Online]. Available:
http://dx.doi.org/10.1109/ISCA.2005.14
[18] D. Lie, J. Mitchell, C. Thekkath, and M. Horowitz, “Specifying and verifying
hardware for tamper-resistant software,” in Proc. of the Symposium
on Security and Privacy, ser. S&P, May 2003.
[19] D. Lie, C. Thekkath, M. Mitchell, P. Lincoln, D. Boneh, J. Mitchell,
and M. Horowitz, “Architectural support for copy and tamper resistant
software,” SIGPLAN Notices, Nov. 2000.
[20] J. M. McCune, Y. Li, N. Qu, Z. Zhou, A. Datta, V. Gligor, and A. Perrig,
“Trustvisor: Efficient tcb reduction and attestation,” in Proc. of the
Symposium on Security and Privacy, ser. S&P, May 2010.
[21] J. C. Mitchell, M. Mitchell, and U. Stern, “Automated analysis of cryptographic
protocols using murphi.” IEEE Computer Society Press,
1997.
[22] J. C. Mitchell, V. Shmatikov, and U. Stern, “Finite-state analysis of ssl
3.0,” in Proc. of the USENIX Security Symposium, Jan. 1998.
[23] S. Qadeer, “Verifying sequential consistency on shared-memory multiprocessors
by model checking,” IEEE Transactions on Parallel and
Distributed Systems, vol. 14, no. 8, pp. 730–741, Aug. 2003.
[24] R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn, “Design and implementation
of a tcg-based integrity measurement architecture,” in Proc.
of the USENIX Security Symposium, Aug. 2004.
[25] D. Schellekens, B. Wyseur, and B. Preneel, “Remote attestation on
legacy operating systems with trusted platform modules,” Journal of
Science of Computer Programming, vol. 74, no. 1-2, Dec. 2008.
[26] A. Seshadri, M. Luk, N. Qu, and A. Perrig, “Secvisor: a tiny hypervisor
to provide lifetime kernel code integrity for commodity oses,” in Proc. of
the Symposium on Operating Systems Principles, ser. SOSP, Oct. 2007.
[27] G. E. Suh, D. Clarke, B. Gassend, M. van Dijk, and S. Devadas, “Aegis:
architecture for tamper-evident and tamper-resistant processing,” in
Proc. of the Int. Conference on Supercomputing, ser. ICS, June 2003.
[28] J. Szefer and R. Lee, “A case for hardware protection of guest vms from
compromised hypervisors in cloud computing,” in Proc. of the Int. Conf.
on Dist. Computing Systems Workshops (ICDCSW), June 2011.
[29] J. Szefer and R. B. Lee, “Architectural Support for Hypervisor-Secure
Virtualization,” in Proc. of Int. Conf. on Architectural Support for Prog.
Languages and Operating Systems, ser. ASPLOS, March 2012.
[30] J. Yang, P. Twohey, D. Engler, and M. Musuvathi, “Using model checking
to find serious file system errors,” ACM Trans. Comput. Syst., Nov.
2006.
54
[1] “Trusted Computing Group. TCG TPM Specification.
http://www.trustedcomputinggroup.org/.”
[2] D. Akhawe, A. Barth, P. E. Lam, J. Mitchell, and D. Song, “Towards a
Formal Foundation of Web Security,” in Proc. of the Computer Security
Foundations Symposium, ser. CSF, July 2010.
[3] E. Brickell, J. Camenisch, and L. Chen, “Direct anonymous attestation,”
in Proc. of the Conference on Computer and Communications Security,
ser. CCS, Oct. 2004.
[4] D. Champagne, “Scalable security architecture for trusted software,”
Ph.D. dissertation, Princeton University, Electrical Engineering Department,
Princeton, NJ, 2010.
[5] D. Champagne and R. B. Lee, “Processor-based tailored attestation,”
Princeton University Department of Electrical Engineering Technical
Report, Nov. 2010.
[6] D. Champagne and R. Lee, “Scalable architectural support for trusted
software,” in Proc. of the Int. Symposium on High Performance Computer
Architecture, ser. HPCA, Jan. 2010.
[7] E. Y. Chen, J. Bau, C. Reis, A. Barth, and C. Jackson, “App isolation:
get the security of multiple browsers with just one,” in Proc. of the Conf.
on Computer and Communications Security, ser. CCS, Oct. 2011.
[8] D. L. Dill, A. J. Drexler, A. J. Hu, and C. H. Yang, “Protocol verification
as a hardware design aid,” in Proc. of the Int. Conference on Computer
Design: VLSI in Computer & Processors, ser. ICCD, Oct. 1992.
[9] J. S. Dwoskin and R. B. Lee, “Hardware-rooted trust for secure key
management and transient trust,” in Proceedings of the 14th ACM
conference on Computer and communications security, ser. CCS ’07.
New York, NY, USA: ACM, 2007, pp. 389–400. [Online]. Available:
http://doi.acm.org/10.1145/1315245.1315294
[10] J. Dyer, M. Lindemann, R. Perez, R. Sailer, L. van Doorn, and S. Smith,
“Building the IBM 4758 secure coprocessor,” IEEE Computer, Oct.
2001.
[11] J. Franklin, S. Chaki, A. Datta, and A. Seshadri, “Scalable parametric
verification of secure systems: How to verify reference monitors without
worrying about data structure size,” in Proc. of the Symposium on
Security and Privacy, ser. S&P, May 2010.
[12] T. C. Group, TCG PC Specific Implementation Specification, 2003.
[13] D. Jackson, Software Abstractions: Logic, Language, and Analysis.
The MIT Press, 2006.
[14] S. Jin, J. Ahn, S. Cha, and J. Huh, “Architectural Support for Secure Virtualization
under a Vulnerable Hypervisor,” in Proc. of Int. Symposium
on Microarchitecture, ser. MICRO, Dec. 2011.
[15] G. Klein, K. Elphinstone, G. Heiser, J. Andronick, D. Cock, P. Derrin,
D. Elkaduwe, K. Engelhardt, R. Kolanski, M. Norrish et al., “seL4:
Formal verification of an OS kernel,” in Proc. of the Symposium on
Operating Systems Principles, ser. SOSP, Oct. 2009.
[16] M. Kwiatkowska, G. Norman, and D. Parker, “PRISM 4.0: Verification
of probabilistic real-time systems,” in Proc. of the Int. Conference on
Computer Aided Verification, ser. CAV, July 2011.
[17] R. B. Lee, P. C. S. Kwan, J. P. McGregor, J. Dwoskin, and Z. Wang,
“Architecture for protecting critical secrets in microprocessors,”
in Proceedings of the 32nd annual international symposium on
Computer Architecture, ser. ISCA ’05. Washington, DC, USA:
IEEE Computer Society, 2005, pp. 2–13. [Online]. Available:
http://dx.doi.org/10.1109/ISCA.2005.14
[18] D. Lie, J. Mitchell, C. Thekkath, and M. Horowitz, “Specifying and verifying
hardware for tamper-resistant software,” in Proc. of the Symposium
on Security and Privacy, ser. S&P, May 2003.
[19] D. Lie, C. Thekkath, M. Mitchell, P. Lincoln, D. Boneh, J. Mitchell,
and M. Horowitz, “Architectural support for copy and tamper resistant
software,” SIGPLAN Notices, Nov. 2000.
[20] J. M. McCune, Y. Li, N. Qu, Z. Zhou, A. Datta, V. Gligor, and A. Perrig,
“Trustvisor: Efficient tcb reduction and attestation,” in Proc. of the
Symposium on Security and Privacy, ser. S&P, May 2010.
[21] J. C. Mitchell, M. Mitchell, and U. Stern, “Automated analysis of cryptographic
protocols using murphi.” IEEE Computer Society Press,
1997.
[22] J. C. Mitchell, V. Shmatikov, and U. Stern, “Finite-state analysis of ssl
3.0,” in Proc. of the USENIX Security Symposium, Jan. 1998.
[23] S. Qadeer, “Verifying sequential consistency on shared-memory multiprocessors
by model checking,” IEEE Transactions on Parallel and
Distributed Systems, vol. 14, no. 8, pp. 730–741, Aug. 2003.
[24] R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn, “Design and implementation
of a tcg-based integrity measurement architecture,” in Proc.
of the USENIX Security Symposium, Aug. 2004.
[25] D. Schellekens, B. Wyseur, and B. Preneel, “Remote attestation on
legacy operating systems with trusted platform modules,” Journal of
Science of Computer Programming, vol. 74, no. 1-2, Dec. 2008.
[26] A. Seshadri, M. Luk, N. Qu, and A. Perrig, “Secvisor: a tiny hypervisor
to provide lifetime kernel code integrity for commodity oses,” in Proc. of
the Symposium on Operating Systems Principles, ser. SOSP, Oct. 2007.
[27] G. E. Suh, D. Clarke, B. Gassend, M. van Dijk, and S. Devadas, “Aegis:
architecture for tamper-evident and tamper-resistant processing,” in
Proc. of the Int. Conference on Supercomputing, ser. ICS, June 2003.
[28] J. Szefer and R. Lee, “A case for hardware protection of guest vms from
compromised hypervisors in cloud computing,” in Proc. of the Int. Conf.
on Dist. Computing Systems Workshops (ICDCSW), June 2011.
[29] J. Szefer and R. B. Lee, “Architectural Support for Hypervisor-Secure
Virtualization,” in Proc. of Int. Conf. on Architectural Support for Prog.
Languages and Operating Systems, ser. ASPLOS, March 2012.
[30] J. Yang, P. Twohey, D. Engler, and M. Musuvathi, “Using model checking
to find serious file system errors,” ACM Trans. Comput. Syst., Nov.
2006.
54
การแปล กรุณารอสักครู่..