Remote Attestation of Software and Execution-Environment in Modern Machines

@article{Kiperberg2015RemoteAO,
  title={Remote Attestation of Software and Execution-Environment in Modern Machines},
  author={Michael Kiperberg and A. Resh and N. Zaidenberg},
  journal={2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing},
  year={2015},
  pages={335-341}
}
  • Michael Kiperberg, A. Resh, N. Zaidenberg
  • Published 2015
  • Computer Science
  • 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing
  • The research on network security concentrates mainly on securing the communication channels between two endpoints, which is insufficient if the authenticity of one of the endpoints cannot be determined with certainty. Previously presented methods that allow one endpoint, the authentication authority, to authenticate another remote machine. These methods are inadequate for modern machines that have multiple processors, introduce virtualization extensions, have a greater variety of side effects… CONTINUE READING
    11 Citations
    RAitc: Securely Auditing the Remotely Executed Applications
    • PDF
    A Cleanroom Monitoring System for Network Computing Service Based on Remote Attestation
    • 4
    System for Executing Encrypted Native Programs
    • 2
    Preventing Execution of Unauthorized Native-Code Software
    • 5
    Efficient Protection for VDI Workstations
    System for Executing Encrypted Java Programs
    • 1
    • PDF
    Hypervisor-assisted Atomic Memory Acquisition in Modern Systems
    • 5
    • PDF

    References

    SHOWING 1-10 OF 24 REFERENCES
    Remote attestation on legacy operating systems with trusted platform modules
    • 98
    • PDF
    Establishing the Genuinity of Remote Computer Systems
    • 196
    • Highly Influential
    • PDF
    Design and Implementation of a TCG-based Integrity Measurement Architecture
    • 1,084
    • PDF
    SWATT: softWare-based attestation for embedded devices
    • 655
    • Highly Influential
    • PDF
    Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems
    • 419
    • Highly Influential
    • PDF
    Remote detection of virtual machine monitors with fuzzy benchmarking
    • 45
    • PDF
    SAKE: Software attestation for key establishment in sensor networks
    • 62
    • PDF
    Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks
    • Y. Yang, X. Wang, S. Zhu, G. Cao
    • Computer Science
    • 2007 26th IEEE International Symposium on Reliable Distributed Systems (SRDS 2007)
    • 2007
    • 147
    • PDF