Back to Results
First PageMeta Content
Trusted computing / Trusted Platform Module / Trusted Computing Group / Trusted Execution Technology / Xen / Ring / Paravirtualization / Virtual machine / Rootkit / System software / Computer security / Software


TOCTOU, Traps, and Trusted Computing Sergey Bratus, Nihal D’Cunha, Evan Sparks, and Sean W. Smith Dartmouth College, Hanover, New Hampshire Abstract. The security of the standard TCG architecture depends on whether th
Add to Reading List

Document Date: 2009-11-12 16:20:18


Open Document

File Size: 251,55 KB

Share Result on Facebook

Company

IBM / Atmel / The Trusted Computing Group / /

Facility

Sean W. Smith Dartmouth College / Although complex / /

IndustryTerm

arbitrary software / hardware-based solution / software prototype system / Thus applications / x86 hardware / physical hardware / loader chain / software proofof-concept demonstration / software proof-of-concept demonstration / guest operating systems / software measurements / hash algorithm / computing / loaded in-memory software / /

OperatingSystem

UNIX / VMs / Linux / /

Organization

Bureau of Justice Assistance / LiveCD Certification Authority / U.S. Department of Homeland Security / Dartmouth College / Institute for Security Technology Studies / /

Person

Sergey Bratus / Evan Sparks / /

Position

driver / Load user application User Application vTPM manager PCR PCR vTPM manager / manager PTE / BIOS programmer / application programmer / TPM driver / policy designer / trusted system engineer / programmer / /

Product

Xen / /

ProvinceOrState

New Hampshire / /

Technology

encryption / virtual machine / RAM / hash algorithm / Linux / UNIX / private key / operating system / operating systems / /

URL

http /

SocialTag