Bootstrapping trust in commodity computers
… a meaningful trust decision (§5). Bootstrapping trust requires some foundational root of trust,
… We then consider how the process of bootstrapping trust can be validated (§7) and used in …
… We then consider how the process of bootstrapping trust can be validated (§7) and used in …
[BOOK][B] Bootstrapping trust in modern computers
… bootstrapping trust in commodity computers, specifically by conveying information about a
computer’… This would, for example, enable a user to verify that her computer is free of malware, …
computer’… This would, for example, enable a user to verify that her computer is free of malware, …
[PDF][PDF] Bootstrapping Trust in a" Trusted" Platform.
B Parno - HotSec, 2008 - usenix.org
… However, the question remains: How do we bootstrap trust in the TPM itself? Surprisingly,
neither the TPM specifications and nor the academic literature have considered this problem. …
neither the TPM specifications and nor the academic literature have considered this problem. …
[BOOK][B] Trust extension as a mechanism for secure code execution on commodity computers
BJ Parno - 2014 - dl.acm.org
… This chapter introduces the notion of bootstrapping trust from one device or service …
bootstrapping trust in commodity computers, specifically by conveying information about a …
bootstrapping trust in commodity computers, specifically by conveying information about a …
Bootstrapping and maintaining trust in the cloud
… keylime provides an end-to-end solution for both bootstrapping hardware rooted … trusted
computing without being trusted computing aware. We show that our bootstrapping protocol can …
computing without being trusted computing aware. We show that our bootstrapping protocol can …
Secure bootstrap is not enough: Shoring up the trusted computing base
J Hendricks, L Van Doorn - Proceedings of the 11th workshop on ACM …, 2004 - dl.acm.org
… the bootstrap process is immutable and therefore trustworthy. This trust is then bootstrapped
all … for each bootstrap step before it is executed. For example, the BIOS could verify a public-…
all … for each bootstrap step before it is executed. For example, the BIOS could verify a public-…
Challenges in bootstrapping trust in secure hardware
… Thus, the TPM can be used to establish trust in the software on a machine. However, the
question remains: How do we bootstrap trust in the TPM itself? Surprisingly, neither the TPM …
question remains: How do we bootstrap trust in the TPM itself? Surprisingly, neither the TPM …
[PDF][PDF] Bootstrapping trust in distributed systems with blockchains
M Ali, J Nelson, R Shea, MJ Freedman - USENIX; login, 2016 - usenix.org
… We believe that in spite of these scalability and performance challenges, blockchains
provide important infrastructure for bootstrapping trust in distributed systems and building new …
provide important infrastructure for bootstrapping trust in distributed systems and building new …
[HTML][HTML] Trust Extension For Commodity Computers A user's trust in a single device can be extended to many other devices.
B Parno - cacm.acm.org
… 20,21 using predicate logic for bootstrapping trust in a local computer with secure hardware.
… of people, computers, and secure hardware (such as TPMs), as well as a set of trust axioms. …
… of people, computers, and secure hardware (such as TPMs), as well as a set of trust axioms. …
Reducing the trusted computing base for applications on commodity systems
JM McCune - 2009 - search.proquest.com
… Since neither SVM nor TXT include any visual indication that a secure session has been
initiated via a late launch, a remote party must be used to bootstrap trust in a platform running …
initiated via a late launch, a remote party must be used to bootstrap trust in a platform running …