Abstract
A user's trust in a single device can be extended to many other devices.
- Advanced Micro Devices. AMD64 Architecture Programmer's Manual. AMD Publication No. 24593, Rev. 3.14, 2007; http://support.amd.com/us/Processor_TechDocs/24593_APM_v2.pdfGoogle Scholar
- Ames, Jr., S.R. Security kernels: A solution or a problem? In Proceedings of the IEEE Symposium on Security and Privacy (Oakland, CA, Apr. 27--29). IEEE Computer Society. Los Alamitos, CA, 1981, 141.Google Scholar
- Anderson, D.P. BOINC: A system for public-resource computing and storage. In Proceedings of the IEEE/ACM Workshop on Grid Computing (Pittsburgh, PA, Nov. 8). IEEE Computer Society, Los Alamitos, CA, 2004, 4--10. Google ScholarDigital Library
- Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Kotsovinos, E., Madhavapeddy, A., Neugebauer R., Pratt, I., and Warfield, A. Xen 2002. Technical Report UCAM-CL-TR-553, University of Cambridge, Cambridge, U.K., Jan. 2003.Google Scholar
- Garriss, S., Cáceres, R., Berger, S., Sailer, R., van Doorn, L., and Zhang, X. Trustworthy and personalized computing on public kiosks. In Proceedings of the Conference on Mobile Systems, Applications, and Services (Breckenridge, CO, June 17--20). ACM Press, New York, 2008, 199--210. Google ScholarDigital Library
- Gennaro, R., Gentry, C., and Parno, B. Non-interactive verifiable computation: Outsourcing computation to untrusted workers. In Advances in Cryptology: Proceedings of the 30th International Cryptology Conference (Santa Barbara, CA, Aug. 15--19, 2010), 465--482. Google ScholarDigital Library
- Gentry, C. Fully homomorphic encryption using ideal lattices. In Proceedings of the 41st ACM Symposium on Theory of Computing (Bethesda, MD, May 31--June 2). ACM Press, New York, 2009, 169--178. Google ScholarDigital Library
- Gold, B.D., Linde, R.R., and Cudney, P.F. KVM/370 in retrospect. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland, CA, Apr. 29--May 2). IEEE Computer Society, Los Alamitos, CA, 1984, 13--23.Google Scholar
- Hao, S., Syed, N.A., Feamster, N., Gray, A.G., and Krasser, S. Detecting spammers with SNARE: Spatio-temporal network-level automatic reputation engine. In Proceedings of the USENIX Security Symposium (Montréal, Aug. 10--14). USENIX Association, Berkeley, CA 2009, 101--118. Google ScholarDigital Library
- Intel Corp. Intel Trusted Execution Technology: Measured Launched Environment Developer's Guide. Document no. 315168-005, Santa Clara, CA, June 2008.Google Scholar
- Karger, P.A., Zurko, M.E., Bonin, D.W., Mason, A.H., and Kahn, C.E. A retrospective on the VAX VMM security kernel. IEEE Transactions on Software Engineering 17, 11 (Nov. 1991), 1147--1165. Google ScholarDigital Library
- Klein, G., Elphinstone, K., Heiser, G., Andronick, J., Cock, D., Derrin, P., Elkaduwe, D., Engelhardt, K., Norrish, M., Kolanski, R., Sewell, T., Tuch, H., and Winwood, S. seL4: Formal verification of an OS kernel. In Proceedings of the ACM Symposium on Operating Systems Principles (Big Sky, MT, Oct. 11--14). ACM Press, New York, 2009, 207--220. Google ScholarDigital Library
- Magenheimer, D. Xen/IA64 Code Size Stats. Xen developer's mailing list 2005; http://lists.xensource.com/Google Scholar
- McCune, J.M. Reducing the Trusted Computing Base for Applications on Commodity Systems. Ph.D. thesis, Carnegie Mellon University, Pittsburgh, PA, Jan. 2009. Google ScholarDigital Library
- McCune, J.M., Berger, S., Cáceres, R., Jaeger, T., and Sailer, R. Shamon: A system for distributed mandatory access control. In Proceedings of the Annual Computer Security Applications Conference (Miami Beach, Dec. 11--15). IEEE Computer Society. Los Alamitos, CA, 2006, 23--32. Google ScholarDigital Library
- McCune, J.M., Parno, B., Perrig, A., Reiter, M.K., and Isozaki, H. Flicker: An execution infrastructure for TCB minimization. In Proceedings of ACM EuroSys (Glasgow, Scotland, Mar. 31--Apr. 4). ACM Press, New York, 2008, 315--328. Google ScholarDigital Library
- McCune, J.M., Parno, B., Perrig, A., Reiter, M.K., and Seshadri, A. How low can you go? Recommendations for hardware-supported minimal TCB code execution. In Proceedings of the ACM International Conference on Architectural Support for Programming Languages and Operating Systems (Seattle, Mar. 1--5). ACM Press, New York, 2008, 14--25. Google ScholarDigital Library
- McCune, J.M., Parno, B., Perrig, A., Reiter, M.K., and Seshadri, A. Minimal TCB code execution (extended abstract). In Proceedings of the IEEE Symposium on Security and Privacy (Oakland, CA, May 20--23). IEEE Computer Society, Los Alamitos, CA, 2007, 267--272. Google ScholarDigital Library
- Pande Lab. The folding@home project. Stanford University; http://folding.stanford.edu/Google Scholar
- Parno, B. Bootstrapping trust in a 'trusted' platform. In Proceedings of the USENIX Workshop on Hot Topics in Security (San Jose, CA, July 29). USENIX Association, Berkeley, CA, 2008, 9:1--9:6. Google ScholarDigital Library
- Parno, B. Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers. Ph.D. thesis, Carnegie Mellon University, Pittsburgh, PA, May 2010. Google ScholarDigital Library
- Parno, B., Lorch, J.R., Douceur, J.R., Mickens, J., and McCune, J.M. Memoir: Practical state continuity for protected modules. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland, CA, May 22--25). IEEE Computer Society. Los Alamitos, CA, 2011, 379--394. Google ScholarDigital Library
- Parno, B., McCune, J.M., and Perrig, A. Bootstrapping Trust in Modern Computers. Springer, New York, 2011. Google ScholarCross Ref
- Parno, B., Zhou, Z., and Perrig, A. Help Me Help You: Using Trustworthy Host-Based Information in the Network. Technical Report CMU-CyLab-09-016, Carnegie Mellon University, Cylab, Pittsburgh, PA, Nov. 2009.Google Scholar
- Sailer, R., Zhang, X., Jaeger, T., and van Doorn, L. Design and implementation of a TCG-based integrity measurement architecture. In Proceedings of the USENIX Security Symposium (San Diego, CA, Aug. 9--13). USENIX Association, Berkeley, CA, 2004, 16--32. Google ScholarDigital Library
- Singaravelu, L., Pu, C., Haertig, H., and Helmuth, C. Reducing TCB complexity for security-sensitive applications: Three case studies. In Proceedings of ACM EuroSys (Leuven, Belgium, Apr. 18--21). ACM Press, New York, 2006, 161--174. Google ScholarDigital Library
- Smith, S.W. and Weingart, S. Building a high-performance, programmable secure coprocessor. Computer Networks 31, 8 (Apr. 1999), 831--860. Google ScholarDigital Library
- Trusted Computing Group. Trusted Platform Module Main Specification. Version 1.2, Revision 103, 2007; http://www.trustedcomputinggroup.org/resources/tpm_main_specificationGoogle Scholar
- Vasudevan, A., Parno, B., Qu, N., Gligor, V.D., and Perrig, A. Lockdown: A Safe and Practical Environment for Security Applications. Technical Report CMU-CyLab-09-011, Carnegie Mellon University, Cylab, Pittsburgh, PA, July 2009.Google Scholar
- Wave Systems Corp. Trusted Computing: An Already Deployed, Cost-Effective, ISO Standard, Highly Secure Solution for Improving Cybersecurity, 2010; http://www.nist.gov/itl/upload/Wave-Systems_Cybersecurity-NOI-Comments_9-13-10.pdfGoogle Scholar
- Yao, A. Protocols for secure computations. In Proceedings of the IEEE Symposium on Foundations of Computer Science (Chicago, Nov. 3--5). IEEE Computer Society. Los Alamitos, CA, 1982, 160--164. Google ScholarDigital Library
Index Terms
- Trust extension for commodity computers
Recommendations
Benevolence trust: a key determinant of user continuance use of online social networks
Online social networking (OSN) has attracted increased attention and growing membership in recent years. In this paper, we propose and test an extended and unified theory of acceptance and use of technology (UTAUT) model, including the additional areas ...
An extension of trust and TAM model with TPB in the initial adoption of on-line tax: an empirical study
While on-line tax is considered as a special type of e-service, the adoption rate of this service in Taiwan is still relatively low. The initial adoption of on-line tax is the important driving force to further influence the use and continued use of ...
Bootstrapping Trust in Commodity Computers
SP '10: Proceedings of the 2010 IEEE Symposium on Security and PrivacyTrusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer's state. We examine research on securely capturing a computer's state, and consider the utility of this ...
Comments