Trusted Execution Technology

Results: 107



#Item
1Attacking Intel® Trusted Execution Technology Rafal Wojtczuk  Joanna Rutkowska

Attacking Intel® Trusted Execution Technology Rafal Wojtczuk Joanna Rutkowska

Add to Reading List

Source URL: invisiblethingslab.com

Language: English - Date: 2018-07-22 16:24:19
    2ETTM: A Scalable Fault Tolerant Network Manager Colin Dixon Hardeep Uppal Vjekoslav Brajkovic Dane Brandon Thomas Anderson Arvind Krishnamurthy University of Washington Abstract In this paper, we design, implement, and e

    ETTM: A Scalable Fault Tolerant Network Manager Colin Dixon Hardeep Uppal Vjekoslav Brajkovic Dane Brandon Thomas Anderson Arvind Krishnamurthy University of Washington Abstract In this paper, we design, implement, and e

    Add to Reading List

    Source URL: colindixon.com

    Language: English - Date: 2012-04-28 16:29:27
    3The Trusted Execution Module: Commodity General-Purpose Trusted Computing Victor Costan, Luis F. G. Sarmenta, Marten van Dijk, and Srinivas Devadas MIT Computer Science and Artificial Intelligence Laboratory, Cambridge,

    The Trusted Execution Module: Commodity General-Purpose Trusted Computing Victor Costan, Luis F. G. Sarmenta, Marten van Dijk, and Srinivas Devadas MIT Computer Science and Artificial Intelligence Laboratory, Cambridge,

    Add to Reading List

    Source URL: people.csail.mit.edu

    Language: English - Date: 2008-06-16 20:15:44
    4cTPM: A Cloud TPM for Cross-Device Trusted Applications Chen Chen† , Himanshu Raj, Stefan Saroiu, and Alec Wolman Microsoft Research and † CMU Current Trusted Platform Modules (TPMs) are illsuited for use in mobile s

    cTPM: A Cloud TPM for Cross-Device Trusted Applications Chen Chen† , Himanshu Raj, Stefan Saroiu, and Alec Wolman Microsoft Research and † CMU Current Trusted Platform Modules (TPMs) are illsuited for use in mobile s

    Add to Reading List

    Source URL: www.netsec.ethz.ch

    Language: English - Date: 2015-06-01 09:06:12
    5Analysis of a Measured Launch

    Analysis of a Measured Launch

    Add to Reading List

    Source URL: evenmere.org

    Language: English - Date: 2008-06-23 13:59:25
    6!!!RELEASED UNDER EMBARGO (UNTIL FEB 18, 3 pm US/Eastern time)!!!  Invisible Things Lab presents the

    !!!RELEASED UNDER EMBARGO (UNTIL FEB 18, 3 pm US/Eastern time)!!! Invisible Things Lab presents the "Press Cheat Sheet" for the Attacking Intel® Trusted Execution Technology presentation at the Black Hat DC conference,

    Add to Reading List

    Source URL: invisiblethingslab.com

    Language: English - Date: 2009-02-19 15:53:39
      7Intel x86 considered harmful Joanna Rutkowska October 2015 Intel x86 considered harmful Version: 1.0

      Intel x86 considered harmful Joanna Rutkowska October 2015 Intel x86 considered harmful Version: 1.0

      Add to Reading List

      Source URL: blog.invisiblethings.org

      Language: English - Date: 2016-03-16 08:27:13
      8A Logic of Secure Systems and its Application to Trusted Computing Anupam Datta Jason Franklin  Deepak Garg

      A Logic of Secure Systems and its Application to Trusted Computing Anupam Datta Jason Franklin Deepak Garg

      Add to Reading List

      Source URL: www.cs.cmu.edu

      Language: English - Date: 2009-06-02 14:26:22
      9Attacking Intel® Trusted Execution Technology Rafal Wojtczuk  Joanna Rutkowska

      Attacking Intel® Trusted Execution Technology Rafal Wojtczuk Joanna Rutkowska

      Add to Reading List

      Source URL: invisiblethingslab.com

      - Date: 2009-02-19 15:54:45
        10Vendor Spotlight  OCTOBER 2012 IBM Offers Cloud Security for a Smarter Planet

        Vendor Spotlight OCTOBER 2012 IBM Offers Cloud Security for a Smarter Planet

        Add to Reading List

        Source URL: www.intel.com

        Language: English - Date: 2015-01-09 15:28:45