Tamper resistance mechanisms for secure embedded systems

S Ravi, A Raghunathan… - … Conference on VLSI …, 2004 - ieeexplore.ieee.org
Security is a concern in the design of a wide range of embedded systems. Extensive
research has been devoted to the development of cryptographic algorithms that provide the …

Keystone: An open framework for architecting trusted execution environments

D Lee, D Kohlbrenner, S Shinde, K Asanović… - Proceedings of the …, 2020 - dl.acm.org
Trusted execution environments (TEEs) see rising use in devices from embedded sensors to
cloud servers and encompass a range of cost, power constraints, and security threat model …

Xen and the art of virtualization

P Barham, B Dragovic, K Fraser, S Hand… - ACM SIGOPS operating …, 2003 - dl.acm.org
Numerous systems have been designed which use virtualization to subdivide the ample
resources of a modern computer. Some require specialized hardware, or cannot support …

PeerReview: Practical accountability for distributed systems

A Haeberlen, P Kouznetsov, P Druschel - ACM SIGOPS operating …, 2007 - dl.acm.org
We describe PeerReview, a system that provides accountability in distributed systems.
PeerReview ensures that Byzantine faults whose effects are observed by a correct node are …

[HTML][HTML] Semantic remote attestation: A virtual machine directed approach to trusted computing

V Haldar, D Chandra, M Franz - USENIX Virtual Machine Research and …, 2004 - usenix.org
Remote attestation is one of the core functionalities provided by trusted computing platforms.
It holds the promise of enabling a variety of novel applications. However, current techniques …

Bootstrap** trust in commodity computers

B Parno, JM McCune, A Perrig - 2010 IEEE Symposium on …, 2010 - ieeexplore.ieee.org
Trusting a computer for a security-sensitive task (such as checking email or banking online)
requires the user to know something about the computer's state. We examine research on …

Manufacturing control system

EKY Jung, RA Levien, RW Lord, MA Malamud… - US Patent …, 2012 - Google Patents
Continuation-in-part of application No. 12/005,162,(57) filed on Dec. 21, 2007. Methods and
systems for a manufacturing control system s include but are not limited to identifying at least …

[KSIĄŻKA][B] Trusted computing

C Mitchell - 2005 - books.google.com
As computers are increasingly embedded, ubiquitous and wirelessly connected, security
becomes imperative. This has led to the development of the notion of a'trusted platform', the …

The security of cloud computing system enabled by trusted computing technology

Z Shen, Q Tong - 2010 2nd International Conference on Signal …, 2010 - ieeexplore.ieee.org
Cloud computing provides people the way to share distributed resources and services that
belong to different organizations or sites. Since cloud computing share distributed resources …

Computer system architecture and method providing operating-system independent virus-, hacker-, and cyber-terror-immune processing environments

K Largman, AB More, J Blair - US Patent 7,392,541, 2008 - Google Patents
OV. 25, Primary Examiner—Christopher Revak Related US Application Data(74) Attorney,
Agent, or Firm—Perkins Coie LLP (63) Continuation-in-part of application No …