User menu

The trusted execution module: commodity general-purpose trusted computing

Bibliographic reference Costan, V. ; Sarmenta, L.F.G. ; van Dijk, M. ; Devadas, S.. The trusted execution module: commodity general-purpose trusted computing.Smart Card Research and Advanced Applications. 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008 (London, UK, 8-11 September 2008). In: Grimaud, G.; Standaert, F.-X.;, Smart Card Research and Advanced Applications. 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, Springer-verlag2008, p. 133-148
Permanent URL http://hdl.handle.net/2078.1/67653
  1. Costan, V.: A commodity trusted computing module. Master’s thesis, Massachusetts Institute of Technology (2008), http://tem.rubyforge.org
  2. Arnold T. W., Van Doorn L. P., The IBM PCIXCC: A new cryptographic coprocessor for the IBM eServer, 10.1147/rd.483.0475
  3. Suh G. Edward, Clarke Dwaine, Gassend Blaise, van Dijk Marten, Devadas Srinivas, AEGIS : architecture for tamper-evident and tamper-resistant processing, 10.1145/782814.782838
  4. Hendry, M.: Smart Card Security and Applications. Artech House (2001)
  5. Husemann Dirk, Standards in the smart card world, 10.1016/s1389-1286(01)00167-0
  6. Maosco, L.: (MultOS), http://www.multos.com/ [cited May, 2008]
  7. Sun Microsystems, I.: Java Card Platform Specification 2.2.1 (2003), http://java.sun.com/javacard/specs.html [cited May, 2008]
  8. Lawson, N.: TPM hardware attacks. root labs rdist (2007), http://rdist.root.org/2007/07/16/tpm-hardware-attacks/ [cited May, 2008]
  9. Lawson, N.: TPM hardware attacks (part 2). root labs rdist (2007), http://rdist.root.org/2007/07/17/tpm-hardware-attacks-part-2/ [cited May, 2008]
  10. Sarmenta Luis F. G., van Dijk Marten, O'Donnell Charles W., Rhodes Jonathan, Devadas Srinivas, Virtual monotonic counters and count-limited objects using a TPM without a trusted OS, 10.1145/1179474.1179485
  11. Group, T.C.: Trusted platform module main (2007), https://www.trustedcomputinggroup.org/specs/TPM/ [cited May, 2008]
  12. Housley R., Polk W., Ford W., Solo D., Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, 10.17487/rfc3280
  13. Lindholm, T., Yellin, F.: Java Virtual Machine Specification. Addison-Wesley Longman Publishing Co., Inc, Boston (1999)
  14. Sussman, G.J.: Guy Lewis Steele, J.: Scheme: An interpreter for extended lambda calculus. Technical Report AI Lab Memo AIM-349, MIT AI Lab (1975)
  15. Guy Lewis Steele, J.: Lambda: The ultimate declarative. Technical Report AI Lab Memo AIM-379, MIT AI Lab (1976)
  16. Guy Lewis Steele, J., Sussman, G.J.: Lambda: The ultimate imperative. Technical Report AI Lab Memo AIM-353, MIT AI Lab (1976)
  17. for Standardizing Information, E.A., Systems, C.: 262: ECMAScript Language Specification. ECMA, Geneva, Switzerland, third edition (1999), http://www.ecma-international.org/publications/files/ECMA-ST/Ecma-262.pdf
  18. Cox, B.: Object oriented programming: an evolutionary approach. Addison-Wesley Longman Publishing Co., Inc., Boston (1986)
  19. Guy Lewis Steele, J.: Rabbit: A compiler for scheme. Master’s thesis, MIT AI Lab (1978)
  20. Eastlake, D., Jones, P.: RFC 3174: US Secure Hash Algorithm 1 (SHA1). Internet RFCs (2001)
  21. Leach, P., Mealling, M., Salz, R.: RFC 4122: A Universally Unique IDentifier (UUID) URN Namespace (2005)
  22. Freier, A., Karlton, P., Kocher, P.: Secure Socket Layer 3.0. IETF draft (1996)
  23. Sasada Koichi, YARV: yet another RubyVM : innovating the ruby interpreter, 10.1145/1094855.1094912
  24. Merkle Ralph C., Protocols for Public Key Cryptosystems, 10.1109/sp.1980.10006
  25. Gassend Blaise, Clarke Dwaine, van Dijk Marten, Devadas Srinivas, Silicon physical random functions, 10.1145/586110.586132
  26. Cuadrado Jesús Sánchez, Molina Jesús García, Building Domain-Specific Languages for Model-Driven Development, 10.1109/ms.2007.135
  27. Cunningham, H.: Reflexive metaprogramming in Ruby: tutorial presentation. Journal of Computing Sciences in Colleges 22, 145–146 (2007)