@inproceedings{113643d6dcf44b51a35e346580f44e81,
title = "Remote Attestation of Software and Execution-Environment in Modern Machines",
abstract = "The research on network security concentrates mainly on securing the communication channels between two endpoints, which is insufficient if the authenticity of one of the endpoints cannot be determined with certainty. Previously presented methods that allow one endpoint, the authentication authority, to authenticate another remote machine. These methods are inadequate for modern machines that have multiple processors, introduce virtualization extensions, have a greater variety of side effects, and suffer from nondeterminism. This paper addresses the advances of modern machines with respect to the method presented by Kennell. The authors describe how a remote attestation procedure, involving a challenge, needs to be structured in order to provide correct attestation of a remote modern target system.",
keywords = "Dynamic Root of Trust, Multicore, Rootkit Detection, Self-checksumming Code, Software-based Root-of-trust, Trusted Computing, Virtualization",
author = "Michael Kiperberg and Amit Resh and Zaidenberg, {Nezer J.}",
note = "Publisher Copyright: {\textcopyright} 2015 IEEE.; 2nd IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2015 ; Conference date: 03-11-2015 Through 05-11-2015",
year = "2016",
month = jan,
day = "4",
doi = "https://doi.org/10.1109/CSCloud.2015.52",
language = "الإنجليزيّة",
series = "Proceedings - 2nd IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2015 - IEEE International Symposium of Smart Cloud, IEEE SSC 2015",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "335--341",
editor = "Tao Zhang and Das, {Sajal K.} and Meikang Qiu",
booktitle = "Proceedings - 2nd IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2015 - IEEE International Symposium of Smart Cloud, IEEE SSC 2015",
address = "الولايات المتّحدة",
}