Flicker: An execution infrastructure for TCB minimization

JM McCune, BJ Parno, A Perrig, MK Reiter… - Proceedings of the 3rd …, 2008 - dl.acm.org
We present Flicker, an infrastructure for executing security-sensitive code in complete
isolation while trusting as few as 250 lines of additional code. Flicker can also provide …

[PDF][PDF] Bootstrapping Trust in a" Trusted" Platform.

B Parno - HotSec, 2008 - usenix.org
For the last few years, many commodity computers have come equipped with a Trusted
Platform Module (TPM). Existing research shows that the TPM can be used to establish trust …

Controlled physical random functions and applications

B Gassend, MV Dijk, D Clarke, E Torlak… - ACM Transactions on …, 2008 - dl.acm.org
The cryptographic protocols that we use in everyday life rely on the secure storage of keys in
consumer devices. Protecting these keys from invasive attackers, who open a device to steal …

Property-based TPM virtualization

AR Sadeghi, C Stüble, M Winandy - International Conference on …, 2008 - Springer
Today, virtualization technologies and hypervisors celebrate their rediscovery. Especially
migration of virtual machines (VMs) between hardware platforms provides a useful and cost …

Secure and backward-compatible processor and secure software execution thereon

P Srinivasan, J Princen, F Berndt, D Blythe… - US Patent …, 2008 - Google Patents
5,638.443 5,715,398 5,715.403 5,765,152 5, 781901 5,790, 170 5,809,242 5,815,662
5,818,512 5,829,046 5,867,223 5,892,900 5,903,723 5,905,860 5,913,039 5,933,498 …

Thinking inside the box: system-level failures of tamper proofing

S Drimer, SJ Murdoch… - 2008 IEEE Symposium on …, 2008 - ieeexplore.ieee.org
PIN entry devices (PEDs) are critical security components in EMV smartcard payment
systems as they receive a customer's card and PIN. Their approval is subject to an extensive …

Secure and backward-compatible processor and secure software execution thereon

P Srinivasan, J Princen, F Berndt, D Blythe… - US Patent …, 2008 - Google Patents
(57) ABSTRACT A secure processor assuring application software is executed securely, and
assuring only authorized software is executed, monitored modes and secure modes of …

System and method for generating new licenses

W Yen, D Blythe, J Princen, P Srinivasan - US Patent 7,464,058, 2008 - Google Patents
Division of application No. 10/703,149,? led on Nov. 5, 2003. Dynamic assignment of rights
to content, such as in a closed distribution system. Noting state information generated by an …

[PDF][PDF] Threats and challenges in reconfigurable hardware security

R Kastner, T Huffmire - 2008 - calhoun.nps.edu
Computing systems designed using reconfigurable hardware are now used in many
sensitive applications, where security is of utmost importance. Unfortunately, a strong notion …

Trustworthy computing under resource constraints with the DOWN policy

M Ramkumar - IEEE Transactions on Dependable and Secure …, 2008 - ieeexplore.ieee.org
Trustworthy computing modules like secure coprocessors (ScP) are already in extensive use
today, albeit limited predominantly to scenarios where constraints on cost is not a serious …