[go: up one dir, main page]

Dunn et al., 2011 - Google Patents

Cloaking malware with the trusted platform module

Dunn et al., 2011

View PDF
Document ID
16307276142376897287
Author
Dunn A
Hofmann O
Waters B
Witchel E
Publication year
Publication venue
20th USENIX Security Symposium (USENIX Security 11)

External Links

Snippet

The Trusted Platform Module (TPM) is commonly thought of as hardware that can increase platform security. However, it can also be used for malicious purposes. The TPM, along with other hardware, can implement a cloaked computation, whose memory state cannot be …
Continue reading at www.usenix.org (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Dunn et al. Cloaking malware with the trusted platform module
Ling et al. Secure boot, trusted boot and remote attestation for ARM TrustZone-based IoT Nodes
Parno et al. Bootstrapping trust in modern computers
KR101158184B1 (en) Protecting content on client platforms
US9754115B2 (en) System and method for securely binding and node-locking program execution to a trusted signature authority
Shakevsky et al. Trust dies in darkness: Shedding light on samsung's {TrustZone} keymaster design
JP7256862B2 (en) Secure communication method and system between protected containers
WO2016045458A1 (en) Security control method and network device
Hosseinzadeh et al. Recent trends in applying TPM to cloud computing
Seol et al. A trusted iaas environment with hardware security module
Jha et al. Trusted platform module-based privacy in the public cloud: Challenges and future perspective
Muñoz et al. TPM, a pattern for an architecture for trusted computing
Liu et al. $ LiveForen $: Ensuring Live Forensic Integrity in the Cloud
KR20100054940A (en) Apparatus and method for preventing malware using signature verification for embedded linux
US10567170B2 (en) Hardware-generated dynamic identifier
Boeck et al. Towards more trustable log files for digital forensics by means of “trusted computing”
Yalew et al. TruApp: A TrustZone-based authenticity detection service for mobile apps
Chandni et al. Establishing trust despite attacks in cloud computing: A survey
Cooper et al. Towards a secure, tamper-proof grid platform
Sisinni Verification of software integrity in distributed systems
Gupta et al. Security and Cryptography
Ozga et al. Chors: Hardening high-assurance security systems with trusted computing
Kouraogo et al. Security model on mobile banking application: attack simulation and countermeasures
Wang et al. Kernel and application integrity assurance: Ensuring freedom from rootkits and malware in a computer system
Galanou et al. MATEE: multimodal attestation for trusted execution environments