[1]
刘孜文,冯登国.基于可信计算的动态完整性度量架构[J].电子与信息学报,2010,32(4): 874-879.
[2]
沈昌祥,张焕国,冯登国,等.信息安全综述[J].中国科学:E辑, 2007,37(2):129-150.
[3]
SAILER R, ZHANG X L, JAEGER T,et al. Design and implementation of a TCG-based integrity measurement architecture[C]// Proceedings of the l3th Usenix Security Symposium. Berkeley: USENIX,2004:223-238.
[4]
PORITZ J,SCHUNTER M,HERREWEGHEN E V, et al. Property attestation-scalable and privacy friendly security assessment of peer computers,RZ-3548[R],New York:IBM,2004.
[5]
SADEGHI A,STLIBLE C. Property-based attestation for computing platforms:Caring about properties,not mechanisms[C]// Proceedings of the New Security Paradigms Workshop. New York:ACM,2004:67-77.
[6]
MICHAEL B, DORNSEIF M, KLEIN C N. FireWire: All your memory are belong to us[EB/OL].[2011-08-10]. http://md.hudora.de/presentations/#firewire-cansecwest.
[7]
SERGEY B, NIHAL D C, EVAN S, et al.TOCTOU, traps, and trusted computing[C] // Proceedings of Trust 2008, LNCS 4968. Berlin: Springer, 2008:14-32.
[8]
NUCK L P, TIMOTHY F, JESUS M, et al. Copilot—a coprocessor-based kernel runtime integrity monitor[C]// Proceedings of the 13th Usenix Security Symposium, Berkeley: USENIX,2004:179-194.
[9]MARTIN A, MIHAI B, ULFAR E, et al.Control-flow integrity[C]// Proceedings of the 12th ACM Conference on Computer and Communications Security. New York:ACM,2005: 340-353.
[10]
NICK L P, MICHAEL H. Automated detection of persistent kernel control-flow attacks[C]// Proceedings of the 14th ACM Conference on Computer and Communications Security. New York:ACM,2007: 103-115.
[11]
SHOU C, JUN X, EMRE C S, et al. Non-control-data attacks are realistic threats[C]// Proceedings of the 14th USENIX Security Symposium. Berkeley: USENIX,2005:177-192.
[12]
PETER A L,PERRY W W,AARON P, et al.Linux kernel integrity measurement using contextual inspection[C]// Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing.New York:ACM,2007:21-29.
[13]
ARVIND S, ADRIAN P, LEENDERT V D, et al.SWATT: SoftWare-based attestation for embedded devices[C]// Proceedings of 2004 IEEE Symposium on Security and Privacy. Oakland:IEEE,2004:272-282.
[14]
ARVIND S, MARK L, NING Q, et al.SecVisor: A tiny hypervisor to guarantee lifetime kernel code integrity for commodity OSes[C]// SOSP:Proceedings of the ACM Symposium on Operating Systems Principles.New York:ACM,2007: 335-350.
[15]
RYAN R,XUXIAN J,DONGYAN X. Guest-transparent prevention of kernel rootkits with VMM-based memory shadowing[C]// Proceedings of the 11th International Symposium on Recent Advances in Intrusion Detection, LNCS 5230. Berlin:Springer,2008:1-20. |