Next: About this document ...
Up: Design and Implementation of
Previous: Acknowledgments
- 1
-
W. A. Arbaugh, D. J. Farber, and J. M. Smith,
``A Secure and Reliable Bootstrap Architecture,''
in IEEE Computer Society Conference on Security and Privacy.
IEEE, 1997, pp. 65-71.
- 2
-
``Trusted Computing Group,'' https://www.trustedcomputinggroup.org.
- 3
-
K. J. Biba,
``Integrity considerations for secure computer systems,''
Tech. Rep. MTR-3153, Mitre Corporation, Mitre Corp, Bedford MA,
June 1975.
- 4
-
D. D. Clark and D. R. Wilson,
``A comparison of commercial and military computer security
policies,''
in IEEE Symposium on Security and Privacy, 1987.
- 5
-
S. W. Smith,
``Outgoing authentication for programmable secure coprocessors,''
in ESORICS, 2002, pp. 72-89.
- 6
-
M. Bond,
``Attacks on cryptoprocessor transaction sets,''
in Proceedings of the 2001 Workshop on Cryptographic Hardware
and Embedded Systems, May 2001.
- 7
-
P. England, B. Lampson, J. Manferdelli, M. Peinado, and B. Willman,
``A Trusted Open Platform,''
IEEE Computer, vol. 36, no. 7, pp. 55-62, 2003.
- 8
-
G. Kim and E. Spafford,
``Experience with Tripwire: Using Integrity Checkers for Intrusion
Detection,''
in System Administration, Networking, and Security Conference
III. USENIX, 1994.
- 9
-
D. Engler, B. Chelf, A. Chou, and S. Hallem,
``Checking systems rules using system-specific, programmer-written
compiler extensions,''
in Proceedings of the Symposium on Operating Systems
Design and Implementation (OSDI 2000), October 2000.
- 10
-
J. Dyer, M. Lindemann, R. Perez, R. Sailer, L. van Doorn, S. W. Smith, and
S. Weingart,
``Building the IBM 4758 Secure Coprocessor,''
IEEE Computer, vol. 34, no. 10, pp. 57-66, 2001.
- 11
-
Trusted Computing Group,
Trusted Platform Module Main Specification, Part 1: Design
Principles, Part 2: TPM Structures, Part 3: Commands, October 2003,
Version 1.2, Revision 62, https://www.trustedcomputinggroup.org.
- 12
-
H. Maruyama, F. Seliger, N. Nagaratnam, T. Ebringer, S. Munetho, and
S. Yoshihama,
``Trusted Platform on demand (TPod),''
in Technical Report, Submitted for Publication, 2004,
In submission.
- 13
-
J. Marchesini, S. Smith, O. Wild, and R. MacDonald,
``Experimenting with TCPA/TCG Hardware, Or: How I Learned to Stop
Worrying and Love the Bear,''
in Technical Report TR2003-476, Dartmouth PKI Lab Dartmouth
College, Hanover, New Hampshire, USA, December 2003.
- 14
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh,
``Terra: A Virtual Machine-Based Platform for Trusted
Computing,''
in Proc. 9th ACM Symposium on Operating Systems Principles,
2003, pp. 193-206.
- 15
-
CERT Coordinatin Center,
``CERT/CC Advisories,'' https://www.cert.org/advisories.
- 16
-
A. B. Brown and M. Seltzer,
``Operating System Benchmarking in the Wake of Lmbench: A Case Study
of the Performance of NetBSD on the Intel x86 Architecture,''
in Proceedings of the 1997 ACM SIGMETRICS Conference on
Measurement and Modeling of Computer Systems, June 1997, pp. 214-224.
- 17
-
T. Jaeger et. al.,
``Leveraging information flow for integrity verification,''
in SUBMITTED for publication, 2004.
sailer 2004-05-18