Trusted Computing aims at enhancing the security of IT systems by using a combination of trusted hardware and software components to provide security guarantees. This includes system state integrity and the secure link between the software and hardware of a computing platform. Although security patterns exist for operating system security, access control, and authentication, there is still none of Trusted Computing aspects. In this paper, we introduce security patterns for secure boot and for secure storage, which are important basic Trusted Computing concepts. Secure boot is at the heart of most security solutions and secure storage is fundamental for application-level security: it ensures that the integrity of software is verified before ...
The Trusted Computing Base (TCB) describes the part of an IT system that is responsible for enforcin...
Security is one of the key quality attributes for many contemporary software products. Designing, de...
The aim of this master thesis is to convey an ellaborate overview of Secure Boot, the technology use...
Trusted Computing aims at enhancing the security of IT systems by using a combination of trusted har...
We initiated an international collaboration between our security groups a few years ago, centered on...
As part of the general goal of providing secure computer systems, the design of verifiably secure o...
Modern computer systems have critical security problems because of two wrong assumptions security sy...
We propose augmenting secure boot with a mechanism to protect against compromises to field-upgradeab...
Trusted computing aims to build a trusted computing environment for information systems with the hel...
Security controls (such as encryption endpoints, payment gateways, and firewalls) rely on correct pr...
The cost of fixing system vulnerabilities and the risk associated with vulnerabilities after system ...
Formal techniques have played a significant role in the study of secure communication in recent year...
It is widely believed that security and usability are two antagonistic goals in system design. This ...
It is widely believed that security and usability are two antagonistic goals in system design. This ...
A firmware encryption for embedded devices can prevent the firmware from being read out to clone the...
The Trusted Computing Base (TCB) describes the part of an IT system that is responsible for enforcin...
Security is one of the key quality attributes for many contemporary software products. Designing, de...
The aim of this master thesis is to convey an ellaborate overview of Secure Boot, the technology use...
Trusted Computing aims at enhancing the security of IT systems by using a combination of trusted har...
We initiated an international collaboration between our security groups a few years ago, centered on...
As part of the general goal of providing secure computer systems, the design of verifiably secure o...
Modern computer systems have critical security problems because of two wrong assumptions security sy...
We propose augmenting secure boot with a mechanism to protect against compromises to field-upgradeab...
Trusted computing aims to build a trusted computing environment for information systems with the hel...
Security controls (such as encryption endpoints, payment gateways, and firewalls) rely on correct pr...
The cost of fixing system vulnerabilities and the risk associated with vulnerabilities after system ...
Formal techniques have played a significant role in the study of secure communication in recent year...
It is widely believed that security and usability are two antagonistic goals in system design. This ...
It is widely believed that security and usability are two antagonistic goals in system design. This ...
A firmware encryption for embedded devices can prevent the firmware from being read out to clone the...
The Trusted Computing Base (TCB) describes the part of an IT system that is responsible for enforcin...
Security is one of the key quality attributes for many contemporary software products. Designing, de...
The aim of this master thesis is to convey an ellaborate overview of Secure Boot, the technology use...