Proceedings of the First ACM Workshop on Scalable Trusted Computing 2006
DOI: 10.1145/1179474.1179487
|View full text |Cite
|
Sign up to set email alerts
|

TCG inside?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2009
2009
2018
2018

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 49 publications
(10 citation statements)
references
References 4 publications
0
10
0
Order By: Relevance
“…Bruschi et al [7] conducted a formal study on the authorization protocol in TPM, and analyze the vulnerabilities in the protocol by model checking. [38] presented a test based method to verify the compliance between TPM and the TCG specifications. Zhang et al [47] analyzed the trusted network connect (TNC) protocols within the universally composable (UC) framework.…”
Section: Formal Verification On Trusted Computingmentioning
confidence: 99%
See 1 more Smart Citation
“…Bruschi et al [7] conducted a formal study on the authorization protocol in TPM, and analyze the vulnerabilities in the protocol by model checking. [38] presented a test based method to verify the compliance between TPM and the TCG specifications. Zhang et al [47] analyzed the trusted network connect (TNC) protocols within the universally composable (UC) framework.…”
Section: Formal Verification On Trusted Computingmentioning
confidence: 99%
“…Recent formal studies on trusted computing mainly fall into two categories: on TCG specifications and on TCG-based secure systems. For the former (correctness study on TCG specifications), the majority of the existing formal modeling and analysis studies focus on key security mechanisms in the specifications [47,18], besides testing based analysis techniques [38,46]. Usually formal verification [47] and the universally composable (UC) framework [18] are employed to analyze the security properties.…”
Section: Introductionmentioning
confidence: 99%
“…RTM is responsible for taking platform integrity measurements, RTS securely stores different integrity measurements and RTR is responsible for reliably reporting values stored in the RTS. At the same time TPM supports other functions such as cryptographic key generation, data sealing and binding (Sadeghi et al, 2006). TPM contains protected storage which is accessible only within TPM and it is protected against physical attack.…”
Section: Introductionmentioning
confidence: 99%
“…The attestation of the core of the operating system, the device drives and the voting application can be cumbersome. Moreover, there are also problems concerning the maturity of the currently deployed technology [14] and concerning the revocation of cracked machines [1]. We believe that, for now, the application of trusted computing to remote voting as the only guaranty of correct application behaviour is not a valid alternative.…”
Section: Related Workmentioning
confidence: 99%