38th Annual 2004 International Carnahan Conference on Security Technology, 2004.
DOI: 10.1109/ccst.2004.1405399
|View full text |Cite
|
Sign up to set email alerts
|

Secure computing using cryptographic assurance of execution correctness

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 2 publications
0
5
0
Order By: Relevance
“…At run-time, within the protected volume of the computer system, the processor removes the protection and confirms the instruction and sequence integrity. This method protection over a large portion of the software life cycle from the time it is shrink-wrapped in the trusted facility through the distribution, loading, and storage phases, up to the point where the instructions or data are accessed by the target CPU [2]. More details on the FE concept can be found in earlier works [3], [4], [5].…”
Section: Cryptographically Assured Processormentioning
confidence: 99%
See 4 more Smart Citations
“…At run-time, within the protected volume of the computer system, the processor removes the protection and confirms the instruction and sequence integrity. This method protection over a large portion of the software life cycle from the time it is shrink-wrapped in the trusted facility through the distribution, loading, and storage phases, up to the point where the instructions or data are accessed by the target CPU [2]. More details on the FE concept can be found in earlier works [3], [4], [5].…”
Section: Cryptographically Assured Processormentioning
confidence: 99%
“…This research is producing a method of hardening the corporate computer infrastructure by prototyping a mixed hardware and software architecture that will enforce policies by pushing distributed security functions closer to the end user's computer, but without reconfiguring the end user's computer itself, and without relying on the correct configuration of the end user's computer. Previous research has developed highly secure network components [2][3] [4][5] [6] [7]. Because it is impractical to replace our entire infrastructure with secure, trusted components, this paper investigates how to improve the security of a heterogeneous infrastructure (Distributed Internetworked Computers) composed of both trusted and untrusted components.…”
Section: Protection Of Distributed Internetworked Computersmentioning
confidence: 99%
See 3 more Smart Citations