• Publications
  • Influence
Design and Implementation of a TCG-based Integrity Measurement Architecture
TLDR
This work shows that many of the Microsoft NGSCB guarantees can be obtained on today's hardware and today's software and that these guarantees do not require a new CPU mode or operating system but merely depend on the availability of an independent trusted entity, a TPM for example.
SWATT: softWare-based attestation for embedded devices
TLDR
This paper presents an implementation of SWATT in off-the-shelf sensor network devices, which enables us to verify the contents of the program memory even while the sensor node is running.
vTPM: Virtualizing the Trusted Platform Module
TLDR
The design and implementation of a system that enables trusted computing for an unlimited number of virtual machines on a single hardware platform and four designs for certificate chains to link the virtual TPM to a hardware TPM are presented, with security vs. efficiency trade-offs based on threat models.
SCUBA: Secure Code Update By Attestation in sensor networks
TLDR
The SCUBA protocol represents a promising approach for designing secure sensor networks by proposing a first approach for automatic recovery of compromised sensor nodes.
A Practical Guide to Trusted Computing
TLDR
Authored by innovators who helped create TPM and implement its leading-edge products, this practical book covers all facets of TPM technology: what it can achieve, how it works, and how to write applications for it.
BIND: a fine-grained attestation service for secure distributed systems
TLDR
BIND offers a general solution toward establishing a trusted environment for distributed system designers and incorporates the verification of input data integrity into the attestation, i.e., through one signature, the authors can vouch for the entire chain of processes that have performed transformations over a piece of data.
Building a MAC-based security architecture for the Xen open-source hypervisor
We present the sHype hypervisor security architecture and examine in detail its mandatory access control facilities. While existing hypervisor security approaches aiming at high assurance have been
The Price of Safety : Evaluating IOMMU Performance
TLDR
The performance characteristics of the Calgary and DART IOMMUs in Linux, both on bare metal and in a hypervisor environment are presented and a set of optimizations and resulting performance improvements are presented.
Trusted virtual domains: toward secure distributed services
TLDR
The aim of this work is to extend this solid base by building "bridges" among trusted islands by enabling meaningful trade agreements between islands, enabling migration of individual island inhabitants, and enabling geography-independent affiliation among inhabitants of different islands.
Building the IBM 4758 Secure Coprocessor
TLDR
The 4758 is a lifetime-secure tamper-responding device, a multipurpose programmable device based on a 99-MHz 486 CPU internal environment, with a real operating system, a C language development environment and relatively high-speed cryptography.
...
...