; --------------------------------------------------------------------- ; To submit, log into grace.umd.edu and use the following command: ; /submit 2015 fall 0101 13 trustworthy_computing.bib ; --------------------------------------------------------------------- ; Required Readings @INPROCEEDINGS{ Sirer11, title = {Logical attestation: an authorization architecture for trustworthy computing}, author = {Emin G{\"{u}}n Sirer and Willem de Bruijn and Patrick Reynolds and Alan Shieh and Kevin Walsh and Dan Williams and Fred B. Schneider}, booktitle = {Proceedings of the 23rd {ACM} Symposium on Operating Systems Principles 2011, {SOSP} 2011, Cascais, Portugal, October 23-26, 2011}, bdsk-url-2 = {http://dx.doi.org/10.1145/2043556.2043580}, bibsource = {dblp computer science bibliography, http://dblp.org}, timestamp = {Mon, 22 Jun 2015 17:24:50 +0200}, url = {http://doi.acm.org/10.1145/2043556.2043580}, doi = {10.1145/2043556.2043580}, crossref = {DBLP:conf/sosp/2011}, year = {2011}, pages = {249--264}, studentfirstname ="", studentlastname ="", summary = "", contribution1 ="", contribution2 ="", contribution3 ="", contribution4 ="", contribution5 ="", weakness1 = "", weakness2 = "", weakness3 = "", weakness4 = "", weakness5 = "", interesting = "high/med/low", opinions = "", } @INPROCEEDINGS{ McCune08, title = {Flicker: an execution infrastructure for tcb minimization}, author = {Jonathan M. McCune and Bryan Parno and Adrian Perrig and Michael K. Reiter and Hiroshi Isozaki}, booktitle = {Proceedings of the 2008 EuroSys Conference, Glasgow, Scotland, UK, April 1-4, 2008}, bdsk-url-2 = {http://dx.doi.org/10.1145/1352592.1352625}, bibsource = {dblp computer science bibliography, http://dblp.org}, timestamp = {Wed, 02 Apr 2008 12:51:08 +0200}, url = {http://doi.acm.org/10.1145/1352592.1352625}, doi = {10.1145/1352592.1352625}, crossref = {DBLP:conf/eurosys/2008}, abstract = {We present Flicker, an infrastructure for executing security-sensitive code in complete isolation while trusting as few as 250 lines of additional code. Flicker can also provide meaningful, fine-grained attestation of the code executed (as well as its inputs and outputs) to a remote party. Flicker guarantees these properties even if the BIOS, OS and DMA-enabled devices are all malicious. Flicker leverages new commodity processors from AMD and Intel and does not require a new OS or VMM. We demonstrate a full implementation of Flicker on an AMD platform and describe our development environment for simplifying the construction of Flicker-enabled code.}, year = {2008}, pages = {315--328}, studentfirstname ="", studentlastname ="", summary = "", contribution1 ="", contribution2 ="", contribution3 ="", contribution4 ="", contribution5 ="", weakness1 = "", weakness2 = "", weakness3 = "", weakness4 = "", weakness5 = "", interesting = "high/med/low", opinions = "", } ; BibTex cross-references (don't add anything here) @PROCEEDINGS{ DBLP:conf/eurosys/2008, title = {Proceedings of the 2008 EuroSys Conference, Glasgow, Scotland, UK, April 1-4, 2008}, bibsource = {dblp computer science bibliography, http://dblp.org}, timestamp = {Wed, 02 Apr 2008 12:41:02 +0200}, editor = {Joseph S. Sventek and Steven Hand}, isbn = {978-1-60558-013-5}, publisher = {{ACM}}, year = {2008}, } @PROCEEDINGS{ DBLP:conf/sosp/2011, title = {Proceedings of the 23rd ACM Symposium on Operating Systems Principles 2011, SOSP 2011, Cascais, Portugal, October 23-26, 2011}, booktitle = {SOSP}, bibsource = {DBLP, http://dblp.uni-trier.de}, editor = {Ted Wobber and Peter Druschel}, isbn = {978-1-4503-0977-6}, publisher = {ACM}, year = {2011}, }