BP: Formal Proofs, the Fine Print and Side Effects
- Computer Science2018 IEEE Cybersecurity Development (SecDev)
This work revisits the meaning of security-related proofs about software, and considers in detail, for the first time to the authors' knowledge, possible relationships between proofs and side effects.
Separation virtual machine monitors
- Computer ScienceACSAC '12
The separation VMM is introduced as a response to this situation and how it was prototyped is explained, as well as how to prototype one.
SHOWING 1-2 OF 2 REFERENCES
This is a separate chip on the motherboard that appears as a PCI-device (to the OS it's just another " card " ) and is used for cryptographic operations. It is enabled/disabled from the BIOS at boot
- TPM: Trusted Platform Module
This is specific set of Intel® x86 CPU instructions that collectively allow a process to start/exit in a known (i.e. secure) state. Among many things, it makes measurements of machine state
- TXT: Trusted eXecution TechnologyBIOS, devices, etc.) and stores them in a Trusted Platform Module (TPM)