Seeding clouds with trust anchors

J Schiffman, T Moyer, H Vijayakumar, T Jaeger… - Proceedings of the …, 2010 - dl.acm.org
Customers with security-critical data processing needs are beginning to push back strongly
against using cloud computing. Cloud vendors run their computations upon cloud provided …

Analysis and design of a hardware/software trusted platform module for embedded systems

N Aaraj, A Raghunathan, NK Jha - ACM Transactions on Embedded …, 2009 - dl.acm.org
Trusted platforms have been proposed as a promising approach to enhance the security of
general-purpose computing systems. However, for many resource-constrained embedded …

Justifying integrity using a virtual machine verifier

J Schiffman, T Moyer, C Shal, T Jaeger… - 2009 Annual …, 2009 - ieeexplore.ieee.org
Emerging distributed computing architectures, such as grid and cloud computing, depend on
the high integrity execution of each system in the computation. While integrity measurement …

Functional testing techniques for digital LSI/VLSI systems

SYH Su, T Lin - 21st Design Automation Conference …, 1984 - ieeexplore.ieee.org
Functional testing is becomilng more important due to the increasing complexity in digital
LSI/VLSI devices. Various functional testing approaches have been proposed to meet this …

Protecting the integrity of trusted applications in mobile phone systems

D Muthukumaran, J Schiffman… - Security and …, 2011 - Wiley Online Library
Mobile phones have evolved into indispensable devices that run many exciting applications
that users can download from phone vendor's application stores. However, as it is not …

A non-interactive dual channel continuous traffic authentication protocol

D Irakiza, ME Karim, VV Phoha - IEEE transactions on …, 2014 - ieeexplore.ieee.org
We introduce a non-interactive dual-channel protocol for continuous traffic authentication
and analyze its security properties. We realize the proposed protocol by facilitating dual …

Practical system integrity verification in cloud computing environments

JS Schiffman - 2012 - etda.libraries.psu.edu
Online applications have become the de facto medium through which modern computing
services are offered. This model not only reduces administrative costs, but enables …

Dual channel-based network traffic authentication

D Irakiza - 2014 - search.proquest.com
In a local network or the Internet in general, data that is transmitted between two computers
(also known as network traffic or simply, traffic) in that network is usually classified as being …

[PDF][PDF] Configuring Cloud Deployments for Integrity

T Jaeger, N Talele, Y Sun, D Muthukumaran… - C&ESAR 2012 - hvijay.github.io
Many cloud vendors now provide pre-configured OS distributions and network firewall
policies to simplify deployment for customers. However, even with this help, customers have …

Efficient and Scalable Verification of Distributed System Integrity using SHIMA

JS Schiffman - 2009 - etda.libraries.psu.edu
Many users obtain critical information from distributed systems. As more Internet services
leverage distributed computing approaches, like mashups and service-oriented …