Security verification of hardware-enabled attestation protocols.
Tianwei ZhangJakub SzeferRuby B. LeePublished in: MICRO Workshops (2012)
Keyphrases
- trusted computing
- cryptographic protocols
- security protocols
- remote attestation
- trusted third party
- computing platform
- high security
- computer security
- computing environments
- authentication protocol
- application level
- security properties
- protocol specification
- mutual authentication
- communication protocols
- cloud computing
- security analysis
- key agreement protocol
- integrity verification
- virtual organization
- computing systems
- real time
- hardware designs
- low cost
- key distribution
- access control
- information security
- java card
- intrusion detection
- credit card
- key establishment
- computer systems
- key exchange
- security level
- formal analysis
- security services
- third party
- security issues
- security requirements
- anomaly detection
- statistical databases
- wireless sensor networks
- privacy protection
- database systems