Tamper resistance mechanisms for secure embedded systems
S Ravi, A Raghunathan… - … Conference on VLSI …, 2004 - ieeexplore.ieee.org
Security is a concern in the design of a wide range of embedded systems. Extensive
research has been devoted to the development of cryptographic algorithms that provide the …
research has been devoted to the development of cryptographic algorithms that provide the …
Keystone: An open framework for architecting trusted execution environments
Trusted execution environments (TEEs) see rising use in devices from embedded sensors to
cloud servers and encompass a range of cost, power constraints, and security threat model …
cloud servers and encompass a range of cost, power constraints, and security threat model …
Xen and the art of virtualization
Numerous systems have been designed which use virtualization to subdivide the ample
resources of a modern computer. Some require specialized hardware, or cannot support …
resources of a modern computer. Some require specialized hardware, or cannot support …
PeerReview: Practical accountability for distributed systems
We describe PeerReview, a system that provides accountability in distributed systems.
PeerReview ensures that Byzantine faults whose effects are observed by a correct node are …
PeerReview ensures that Byzantine faults whose effects are observed by a correct node are …
[HTML][HTML] Semantic remote attestation: A virtual machine directed approach to trusted computing
Remote attestation is one of the core functionalities provided by trusted computing platforms.
It holds the promise of enabling a variety of novel applications. However, current techniques …
It holds the promise of enabling a variety of novel applications. However, current techniques …
Bootstrap** trust in commodity computers
Trusting a computer for a security-sensitive task (such as checking email or banking online)
requires the user to know something about the computer's state. We examine research on …
requires the user to know something about the computer's state. We examine research on …
Manufacturing control system
EKY Jung, RA Levien, RW Lord, MA Malamud… - US Patent …, 2012 - Google Patents
Continuation-in-part of application No. 12/005,162,(57) filed on Dec. 21, 2007. Methods and
systems for a manufacturing control system s include but are not limited to identifying at least …
systems for a manufacturing control system s include but are not limited to identifying at least …
[KSIĄŻKA][B] Trusted computing
C Mitchell - 2005 - books.google.com
As computers are increasingly embedded, ubiquitous and wirelessly connected, security
becomes imperative. This has led to the development of the notion of a'trusted platform', the …
becomes imperative. This has led to the development of the notion of a'trusted platform', the …
The security of cloud computing system enabled by trusted computing technology
Z Shen, Q Tong - 2010 2nd International Conference on Signal …, 2010 - ieeexplore.ieee.org
Cloud computing provides people the way to share distributed resources and services that
belong to different organizations or sites. Since cloud computing share distributed resources …
belong to different organizations or sites. Since cloud computing share distributed resources …
Computer system architecture and method providing operating-system independent virus-, hacker-, and cyber-terror-immune processing environments
K Largman, AB More, J Blair - US Patent 7,392,541, 2008 - Google Patents
OV. 25, Primary Examiner—Christopher Revak Related US Application Data(74) Attorney,
Agent, or Firm—Perkins Coie LLP (63) Continuation-in-part of application No …
Agent, or Firm—Perkins Coie LLP (63) Continuation-in-part of application No …