Bootstrapping trust in commodity computers

B Parno, JM McCune, A Perrig - 2010 IEEE Symposium on …, 2010 - ieeexplore.ieee.org
… a meaningful trust decision (§5). Bootstrapping trust requires some foundational root of trust,
… We then consider how the process of bootstrapping trust can be validated (§7) and used in …

[BOOK][B] Bootstrapping trust in modern computers

B Parno, JM McCune, A Perrig - 2011 - books.google.com
bootstrapping trust in commodity computers, specifically by conveying information about a
computer’… This would, for example, enable a user to verify that her computer is free of malware, …

[PDF][PDF] Bootstrapping Trust in a" Trusted" Platform.

B Parno - HotSec, 2008 - usenix.org
… However, the question remains: How do we bootstrap trust in the TPM itself? Surprisingly,
neither the TPM specifications and nor the academic literature have considered this problem. …

[BOOK][B] Trust extension as a mechanism for secure code execution on commodity computers

BJ Parno - 2014 - dl.acm.org
… This chapter introduces the notion of bootstrapping trust from one device or service …
bootstrapping trust in commodity computers, specifically by conveying information about a …

Bootstrapping and maintaining trust in the cloud

N Schear, PT Cable, TM Moyer, B Richard… - … on Computer Security …, 2016 - dl.acm.org
… keylime provides an end-to-end solution for both bootstrapping hardware rooted … trusted
computing without being trusted computing aware. We show that our bootstrapping protocol can …

Secure bootstrap is not enough: Shoring up the trusted computing base

J Hendricks, L Van Doorn - Proceedings of the 11th workshop on ACM …, 2004 - dl.acm.org
… the bootstrap process is immutable and therefore trustworthy. This trust is then bootstrapped
all … for each bootstrap step before it is executed. For example, the BIOS could verify a public-…

Challenges in bootstrapping trust in secure hardware

B Parno, JM McCune, A Perrig, B Parno… - Bootstrapping Trust in …, 2011 - Springer
… Thus, the TPM can be used to establish trust in the software on a machine. However, the
question remains: How do we bootstrap trust in the TPM itself? Surprisingly, neither the TPM …

[PDF][PDF] Bootstrapping trust in distributed systems with blockchains

M Ali, J Nelson, R Shea, MJ Freedman - USENIX; login, 2016 - usenix.org
… We believe that in spite of these scalability and performance challenges, blockchains
provide important infrastructure for bootstrapping trust in distributed systems and building new …

[HTML][HTML] Trust Extension For Commodity Computers A user's trust in a single device can be extended to many other devices.

B Parno - cacm.acm.org
… 20,21 using predicate logic for bootstrapping trust in a local computer with secure hardware.
… of people, computers, and secure hardware (such as TPMs), as well as a set of trust axioms. …

Reducing the trusted computing base for applications on commodity systems

JM McCune - 2009 - search.proquest.com
… Since neither SVM nor TXT include any visual indication that a secure session has been
initiated via a late launch, a remote party must be used to bootstrap trust in a platform running …