Flicker: An execution infrastructure for TCB minimization
We present Flicker, an infrastructure for executing security-sensitive code in complete
isolation while trusting as few as 250 lines of additional code. Flicker can also provide …
isolation while trusting as few as 250 lines of additional code. Flicker can also provide …
[PDF][PDF] Bootstrapping Trust in a" Trusted" Platform.
B Parno - HotSec, 2008 - usenix.org
For the last few years, many commodity computers have come equipped with a Trusted
Platform Module (TPM). Existing research shows that the TPM can be used to establish trust …
Platform Module (TPM). Existing research shows that the TPM can be used to establish trust …
Controlled physical random functions and applications
The cryptographic protocols that we use in everyday life rely on the secure storage of keys in
consumer devices. Protecting these keys from invasive attackers, who open a device to steal …
consumer devices. Protecting these keys from invasive attackers, who open a device to steal …
Property-based TPM virtualization
AR Sadeghi, C Stüble, M Winandy - International Conference on …, 2008 - Springer
Today, virtualization technologies and hypervisors celebrate their rediscovery. Especially
migration of virtual machines (VMs) between hardware platforms provides a useful and cost …
migration of virtual machines (VMs) between hardware platforms provides a useful and cost …
Secure and backward-compatible processor and secure software execution thereon
5,638.443 5,715,398 5,715.403 5,765,152 5, 781901 5,790, 170 5,809,242 5,815,662
5,818,512 5,829,046 5,867,223 5,892,900 5,903,723 5,905,860 5,913,039 5,933,498 …
5,818,512 5,829,046 5,867,223 5,892,900 5,903,723 5,905,860 5,913,039 5,933,498 …
Thinking inside the box: system-level failures of tamper proofing
S Drimer, SJ Murdoch… - 2008 IEEE Symposium on …, 2008 - ieeexplore.ieee.org
PIN entry devices (PEDs) are critical security components in EMV smartcard payment
systems as they receive a customer's card and PIN. Their approval is subject to an extensive …
systems as they receive a customer's card and PIN. Their approval is subject to an extensive …
Secure and backward-compatible processor and secure software execution thereon
(57) ABSTRACT A secure processor assuring application software is executed securely, and
assuring only authorized software is executed, monitored modes and secure modes of …
assuring only authorized software is executed, monitored modes and secure modes of …
System and method for generating new licenses
Division of application No. 10/703,149,? led on Nov. 5, 2003. Dynamic assignment of rights
to content, such as in a closed distribution system. Noting state information generated by an …
to content, such as in a closed distribution system. Noting state information generated by an …
[PDF][PDF] Threats and challenges in reconfigurable hardware security
R Kastner, T Huffmire - 2008 - calhoun.nps.edu
Computing systems designed using reconfigurable hardware are now used in many
sensitive applications, where security is of utmost importance. Unfortunately, a strong notion …
sensitive applications, where security is of utmost importance. Unfortunately, a strong notion …
Trustworthy computing under resource constraints with the DOWN policy
M Ramkumar - IEEE Transactions on Dependable and Secure …, 2008 - ieeexplore.ieee.org
Trustworthy computing modules like secure coprocessors (ScP) are already in extensive use
today, albeit limited predominantly to scenarios where constraints on cost is not a serious …
today, albeit limited predominantly to scenarios where constraints on cost is not a serious …