Check out the new USENIX Web site. next up previous
Next: About this document ... Up: Design and Implementation of Previous: Acknowledgments

Bibliography

1
W. A. Arbaugh, D. J. Farber, and J. M. Smith,
``A Secure and Reliable Bootstrap Architecture,''
in IEEE Computer Society Conference on Security and Privacy. IEEE, 1997, pp. 65-71.

2
``Trusted Computing Group,'' https://www.trustedcomputinggroup.org.

3
K. J. Biba,
``Integrity considerations for secure computer systems,''
Tech. Rep. MTR-3153, Mitre Corporation, Mitre Corp, Bedford MA, June 1975.

4
D. D. Clark and D. R. Wilson,
``A comparison of commercial and military computer security policies,''
in IEEE Symposium on Security and Privacy, 1987.

5
S. W. Smith,
``Outgoing authentication for programmable secure coprocessors,''
in ESORICS, 2002, pp. 72-89.

6
M. Bond,
``Attacks on cryptoprocessor transaction sets,''
in Proceedings of the 2001 Workshop on Cryptographic Hardware and Embedded Systems, May 2001.

7
P. England, B. Lampson, J. Manferdelli, M. Peinado, and B. Willman,
``A Trusted Open Platform,''
IEEE Computer, vol. 36, no. 7, pp. 55-62, 2003.

8
G. Kim and E. Spafford,
``Experience with Tripwire: Using Integrity Checkers for Intrusion Detection,''
in System Administration, Networking, and Security Conference III. USENIX, 1994.

9
D. Engler, B. Chelf, A. Chou, and S. Hallem,
``Checking systems rules using system-specific, programmer-written compiler extensions,''
in Proceedings of the $4^{th}$ Symposium on Operating Systems Design and Implementation (OSDI 2000), October 2000.

10
J. Dyer, M. Lindemann, R. Perez, R. Sailer, L. van Doorn, S. W. Smith, and S. Weingart,
``Building the IBM 4758 Secure Coprocessor,''
IEEE Computer, vol. 34, no. 10, pp. 57-66, 2001.

11
Trusted Computing Group,
Trusted Platform Module Main Specification, Part 1: Design Principles, Part 2: TPM Structures, Part 3: Commands, October 2003,
Version 1.2, Revision 62, https://www.trustedcomputinggroup.org.

12
H. Maruyama, F. Seliger, N. Nagaratnam, T. Ebringer, S. Munetho, and S. Yoshihama,
``Trusted Platform on demand (TPod),''
in Technical Report, Submitted for Publication, 2004,
In submission.

13
J. Marchesini, S. Smith, O. Wild, and R. MacDonald,
``Experimenting with TCPA/TCG Hardware, Or: How I Learned to Stop Worrying and Love the Bear,''
in Technical Report TR2003-476, Dartmouth PKI Lab Dartmouth College, Hanover, New Hampshire, USA, December 2003.

14
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh,
``Terra: A Virtual Machine-Based Platform for Trusted Computing,''
in Proc. 9th ACM Symposium on Operating Systems Principles, 2003, pp. 193-206.

15
CERT Coordinatin Center,
``CERT/CC Advisories,'' https://www.cert.org/advisories.

16
A. B. Brown and M. Seltzer,
``Operating System Benchmarking in the Wake of Lmbench: A Case Study of the Performance of NetBSD on the Intel x86 Architecture,''
in Proceedings of the 1997 ACM SIGMETRICS Conference on Measurement and Modeling of Computer Systems, June 1997, pp. 214-224.

17
T. Jaeger et. al.,
``Leveraging information flow for integrity verification,''
in SUBMITTED for publication, 2004.


sailer 2004-05-18