Minimal TCB code execution
Publication
, Conference
McCune, JM; Parno, B; Perrig, A; Reiter, MK; Seshadri, A
Published in: Proceedings - IEEE Symposium on Security and Privacy
September 25, 2007
We propose an architecture that allows code to execute in complete isolation from other software while trusting only a tiny software base that is orders of magnitude smaller than even minimalist virtual machine monitors. Our technique also enables more meaningful attestation than previous proposals, since only measurements of the security-sensitive portions of an application need to be included. We achieve these guarantees by leveraging hardware support provided by commodity processors from AMD and Intel that are shipping today. © 2007 IEEE.
Duke Scholars
Published In
Proceedings - IEEE Symposium on Security and Privacy
DOI
ISSN
1081-6011
Publication Date
September 25, 2007
Start / End Page
267 / 272
Citation
APA
Chicago
ICMJE
MLA
NLM
McCune, J. M., Parno, B., Perrig, A., Reiter, M. K., & Seshadri, A. (2007). Minimal TCB code execution. In Proceedings - IEEE Symposium on Security and Privacy (pp. 267–272). https://doi.org/10.1109/SP.2007.27
McCune, J. M., B. Parno, A. Perrig, M. K. Reiter, and A. Seshadri. “Minimal TCB code execution.” In Proceedings - IEEE Symposium on Security and Privacy, 267–72, 2007. https://doi.org/10.1109/SP.2007.27.
McCune JM, Parno B, Perrig A, Reiter MK, Seshadri A. Minimal TCB code execution. In: Proceedings - IEEE Symposium on Security and Privacy. 2007. p. 267–72.
McCune, J. M., et al. “Minimal TCB code execution.” Proceedings - IEEE Symposium on Security and Privacy, 2007, pp. 267–72. Scopus, doi:10.1109/SP.2007.27.
McCune JM, Parno B, Perrig A, Reiter MK, Seshadri A. Minimal TCB code execution. Proceedings - IEEE Symposium on Security and Privacy. 2007. p. 267–272.
Published In
Proceedings - IEEE Symposium on Security and Privacy
DOI
ISSN
1081-6011
Publication Date
September 25, 2007
Start / End Page
267 / 272