Dunn et al., 2011 - Google Patents
Cloaking malware with the trusted platform moduleDunn et al., 2011
View PDF- Document ID
- 16307276142376897287
- Author
- Dunn A
- Hofmann O
- Waters B
- Witchel E
- Publication year
- Publication venue
- 20th USENIX Security Symposium (USENIX Security 11)
External Links
Snippet
The Trusted Platform Module (TPM) is commonly thought of as hardware that can increase platform security. However, it can also be used for malicious purposes. The TPM, along with other hardware, can implement a cloaked computation, whose memory state cannot be …
- 210000004470 MDP 0 description 26
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Dunn et al. | Cloaking malware with the trusted platform module | |
Ling et al. | Secure boot, trusted boot and remote attestation for ARM TrustZone-based IoT Nodes | |
Parno et al. | Bootstrapping trust in modern computers | |
KR101158184B1 (en) | Protecting content on client platforms | |
US9754115B2 (en) | System and method for securely binding and node-locking program execution to a trusted signature authority | |
Shakevsky et al. | Trust dies in darkness: Shedding light on samsung's {TrustZone} keymaster design | |
JP7256862B2 (en) | Secure communication method and system between protected containers | |
WO2016045458A1 (en) | Security control method and network device | |
Hosseinzadeh et al. | Recent trends in applying TPM to cloud computing | |
Seol et al. | A trusted iaas environment with hardware security module | |
Jha et al. | Trusted platform module-based privacy in the public cloud: Challenges and future perspective | |
Muñoz et al. | TPM, a pattern for an architecture for trusted computing | |
Liu et al. | $ LiveForen $: Ensuring Live Forensic Integrity in the Cloud | |
KR20100054940A (en) | Apparatus and method for preventing malware using signature verification for embedded linux | |
US10567170B2 (en) | Hardware-generated dynamic identifier | |
Boeck et al. | Towards more trustable log files for digital forensics by means of “trusted computing” | |
Yalew et al. | TruApp: A TrustZone-based authenticity detection service for mobile apps | |
Chandni et al. | Establishing trust despite attacks in cloud computing: A survey | |
Cooper et al. | Towards a secure, tamper-proof grid platform | |
Sisinni | Verification of software integrity in distributed systems | |
Gupta et al. | Security and Cryptography | |
Ozga et al. | Chors: Hardening high-assurance security systems with trusted computing | |
Kouraogo et al. | Security model on mobile banking application: attack simulation and countermeasures | |
Wang et al. | Kernel and application integrity assurance: Ensuring freedom from rootkits and malware in a computer system | |
Galanou et al. | MATEE: multimodal attestation for trusted execution environments |