Author:
Fu Yingfang,Huang Haoxiang,Zhang Jianbiao
Publisher
Springer Nature Singapore
Reference30 articles.
1. GB/T 37935-2019, Information security technology—Trusted computing specification—Trusted software base (2019)
2. Sailer, R., Zhang, X., Jaeger, T., et al.: Design and implementation of a TCG-based integrity measurement architecture. In: Proceedings of the 13th USENIX Security Symposium, 9–13 August 2004, San Diego, CA, USA (2004)
3. Petroni, N.L., Hicks, M.: Automated detection of persistent kernel control-flow attacks. In: Proceedings of the 14th ACM conference on Computer and communications security (CCS 2007), pp. 103–115. Association for Computing Machinery, New York, NY, USA (2007)
4. Jaeger, T., Sailer, R., Shankar, U.: Prima: policy-reduced integrity measurement architecture (2007)
5. Liu, C., Fan, M., Feng, Y., et al.: Dynamic integrity measurement model based on trusted computing. In: International Conference on Computational Intelligence and Security, CIS 2008, vol. 1, pp. 281–284 (2008)