; --------------------------------------------------------------------- ; To submit, log into grace.umd.edu and use the following command: ; /submit 2017 fall ENEE 657 0101 16 trustworthy_computing.bib ; --------------------------------------------------------------------- ; Required Readings @ARTICLE{ McCune2008, title = {{Flicker: An Execution Infrastructure for TCB Minimization}}, author = {McCune, Jonathan M. and Parno, Bryan J. and Perrig, Adrian and Reiter, Michael K. and Isozaki, Hiroshi}, journal = {EuroSys'08}, keywords = {late launch,secure execution,trusted computing}, issn = {01635980}, isbn = {9781605580135}, volume = {42}, doi = {10.1145/1357010.1352625}, year = {2008}, url = {http://dl.acm.org/citation.cfm?id=1357010.1352625{\%}5Cnhttp://portal.acm.org/citation.cfm?doid=1352592.1352625}, abstract = {We present Flicker, an infrastructure for executing security-sensitive code in complete isolation while trusting as few as 250 lines of additional code. Flicker can also provide meaningful, fine-grained attestation of the code executed (as well as its inputs and outputs) to a remote party. Flicker guarantees these properties even if the BIOS, OS and DMA-enabled devices are all malicious. Flicker leverages new commodity processors from AMD and Intel and does not require a new OS or VMM. We demonstrate a full implementation of Flicker on an AMD platform and describe our development environment for simplifying the construction of Flicker-enabled code.}, pages = {315}, number = {4}, studentfirstname ={}, studentlastname ={}, summary = {}, contribution1 ={}, contribution2 ={}, contribution3 ={}, contribution4 ={}, contribution5 ={}, weakness1 = {}, weakness2 = {}, weakness3 = {}, weakness4 = {}, weakness5 = {}, interesting = {high/med/low}, opinions = {}, } @ARTICLE{ Zhou, title = {{KISS ++ : Key It Simple and Secure ++}}, author = {Zhou, Zongwei and Han, Jun and Lin, Yue-hsun and Perrig, Adrian and Gligor, Virgil}, number = {April 2008}, pages = {2008}, volume = {42}, keywords = {isolation,key management,trusted computing,trusted path}, studentfirstname ={}, studentlastname ={}, summary = {}, contribution1 ={}, contribution2 ={}, contribution3 ={}, contribution4 ={}, contribution5 ={}, weakness1 = {}, weakness2 = {}, weakness3 = {}, weakness4 = {}, weakness5 = {}, interesting = {high/med/low}, opinions = {}, } ; BibTex cross-references (don't add anything here)