You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
288 lines
8.1 KiB
288 lines
8.1 KiB
@article{schnorr91,
|
|
author = {Schnorr, Claus},
|
|
year = {1991},
|
|
month = {01},
|
|
pages = {161-174},
|
|
title = {Efficient signature generation by smart cards},
|
|
volume = {4},
|
|
journal = {Journal of Cryptology},
|
|
doi = {10.1007/BF00196725}
|
|
}
|
|
|
|
@article{cramer98,
|
|
author = {Cramer, R. and Shoup, V.},
|
|
year = {1998},
|
|
month = {01},
|
|
pages = {},
|
|
title = {A practical public-key cryptosystem secure against adaptive chosen ciphertexts attacks}
|
|
}
|
|
|
|
@inproceedings{camenisch04,
|
|
author = {Camenisch, Jan and Lysyanskaya, Anna},
|
|
year = {2004},
|
|
month = {08},
|
|
pages = {56-72},
|
|
title = {Signature Schemes and Anonymous Credentials from Bilinear Maps},
|
|
volume = {3152/2004},
|
|
journal = {Signature Schemes and Anonymous Credentials from Bilinear Maps},
|
|
doi = {10.1007/978-3-540-28628-8_4}
|
|
}
|
|
|
|
@inproceedings{camenisch16,
|
|
author = {Camenisch, Jan and Drijvers, Manu and Lehmann, Anja},
|
|
year = {2016},
|
|
month = {03},
|
|
pages = {234-264},
|
|
title = {Universally Composable Direct Anonymous Attestation},
|
|
volume = {9615},
|
|
isbn = {978-3-662-49386-1},
|
|
doi = {10.1007/978-3-662-49387-8_10}
|
|
}
|
|
|
|
@inproceedings{barreto05,
|
|
author = {Barreto, Paulo and Naehrig, Michael},
|
|
year = {2005},
|
|
month = {08},
|
|
pages = {319-331},
|
|
title = {Pairing-Friendly Elliptic Curves of Prime Order},
|
|
volume = {3897},
|
|
journal = {LNCS},
|
|
doi = {10.1007/11693383_22}
|
|
}
|
|
|
|
@article{camenisch97,
|
|
author = {Camenisch, Jan and Stadler, Markus},
|
|
year = {1997},
|
|
month = {01},
|
|
pages = {},
|
|
title = {Efficient Group Signature Schemes for Large Groups},
|
|
volume = {1296},
|
|
journal = {CRYPTO '97}
|
|
}
|
|
|
|
@inproceedings{chen09,
|
|
author = {Chen, Liqun and Page, Dan and Smart, Nigel},
|
|
year = {2010},
|
|
month = {11},
|
|
pages = {223-237},
|
|
title = {On the Design and Implementation of an Efficient DAA Scheme},
|
|
doi = {10.1007/978-3-642-12510-2_16}
|
|
}
|
|
|
|
@inproceedings{chen10,
|
|
author = {Chen, Liqun and Page, Dan and Smart, Nigel},
|
|
year = {2010},
|
|
month = {11},
|
|
pages = {223-237},
|
|
title = {On the Design and Implementation of an Efficient DAA Scheme},
|
|
doi = {10.1007/978-3-642-12510-2_16}
|
|
}
|
|
|
|
@inproceedings{camenisch17,
|
|
author = {Camenisch, Jan and Chen, Liqun and Drijvers, Manu and Lehmann, Anja and Novick, David and Urian, Rainer},
|
|
year = {2017},
|
|
month = {05},
|
|
pages = {901-920},
|
|
title = {One TPM to Bind Them All: Fixing TPM 2.0 for Provably Secure Anonymous Attestation},
|
|
doi = {10.1109/SP.2017.22}
|
|
}
|
|
|
|
@article{winkler11,
|
|
author = {Winkler, Thomas and Rinner, Bernhard},
|
|
year = {2011},
|
|
month = {01},
|
|
pages = {},
|
|
title = {Securing Embedded Smart Cameras with Trusted Computing},
|
|
volume = {2011},
|
|
journal = {EURASIP J. Wireless Comm. and Networking},
|
|
doi = {10.1155/2011/530354}
|
|
}
|
|
|
|
@book{arthur15,
|
|
author = {Arthur, Will and Challener, David and Goldman, Kenneth},
|
|
year = {2015},
|
|
month = {01},
|
|
pages = {},
|
|
title = {A Practical Guide to TPM 2.0},
|
|
doi = {10.1007/978-1-4302-6584-9}
|
|
}
|
|
|
|
@book{proudler14,
|
|
author = {Proudler, Graeme and Chen, Liqun and Dalton, Chris},
|
|
year = {2014},
|
|
month = {01},
|
|
pages = {},
|
|
title = {Trusted Computing Platforms},
|
|
doi = {10.1007/978-3-319-08744-3}
|
|
}
|
|
|
|
@online{pornkitprasan19-diskencryption,
|
|
author = {Pawit Pornkitprasan},
|
|
year = {2019},
|
|
month = {07},
|
|
title = {Full Disk Encryption on Arch Linux backed by TPM 2.0},
|
|
url = {https://medium.com/@pawitp/full-disk-encryption-on-arch-linux-backed-by-tpm-2-0-c0892cab9704},
|
|
urldate = {2020-02-27}
|
|
}
|
|
|
|
@online{pornkitprasan19-tpmtools,
|
|
author = {Pawit Pornkitprasan},
|
|
year = {2019},
|
|
month = {10},
|
|
title = {Its certainly annoying that TPM2-Tools like to change their command line parameters},
|
|
url = {https://medium.com/@pawitp/its-certainly-annoying-that-tpm2-tools-like-to-change-their-command-line-parameters-d5d0f4351206},
|
|
urldate = {2020-02-27}
|
|
}
|
|
|
|
@online{tevora-secureboot,
|
|
author = {Tevora},
|
|
year = {2019},
|
|
month = {06},
|
|
title = {Configuring Secure Boot + TPM 2},
|
|
url = {https://threat.tevora.com/secure-boot-tpm-2/},
|
|
urldate = {2020-06-19}
|
|
}
|
|
|
|
@online{pornkitprasan19-secureboot,
|
|
author = {Pawit Pornkitprasan},
|
|
year = {2019},
|
|
month = {07},
|
|
title = {The Correct Way to use Secure Boot with Linux},
|
|
url = {https://medium.com/@pawitp/the-correct-way-to-use-secure-boot-with-linux-a0421796eade},
|
|
urldate = {2020-02-27}
|
|
}
|
|
|
|
@online{tpmsoftware20,
|
|
author = {TPM2 Software Community},
|
|
year = {2020},
|
|
title = {TPM2 Tools},
|
|
url = {https://github.com/tpm2-software/tpm2-tools},
|
|
urldate = {2020-05-15}
|
|
}
|
|
|
|
@online{smith18-dealing-sb,
|
|
author = {Rod Smith},
|
|
year = {2018},
|
|
month = {07},
|
|
title = {Managing EFI Boot Loaders for Linux: Dealing with Secure Boot},
|
|
url = {https://www.rodsbooks.com/efi-bootloaders/secureboot.html},
|
|
urldate = {2020-02-27}
|
|
}
|
|
|
|
@online{smith18-controlling-sb,
|
|
author = {Rod Smith},
|
|
year = {2018},
|
|
month = {07},
|
|
title = {Managing EFI Boot Loaders for Linux: Controlling Secure Boot},
|
|
url = {https://www.rodsbooks.com/efi-bootloaders/controlling-sb.html},
|
|
urldate = {2020-02-27}
|
|
}
|
|
|
|
@online{corbet16,
|
|
author = {Jonathan Corbet},
|
|
year = {2016},
|
|
month = {02},
|
|
title = {Protecting systems with the TPM},
|
|
url = {https://lwn.net/Articles/674751/},
|
|
urldate = {2020-02-27}
|
|
}
|
|
|
|
@online{kernelsecurity18,
|
|
author = {},
|
|
year = {2018},
|
|
month = {03},
|
|
title = {Linux Kernel Integrity},
|
|
url = {https://kernsec.org/wiki/index.php/Linux_Kernel_Integrity},
|
|
urldate = {2020-02-27}
|
|
}
|
|
|
|
@inproceedings{chevalier19,
|
|
author = {Chevalier, Ronny and Cristalli, Stefano and Hauser, Christophe and Shoshitaishvili,
|
|
Yan and Wang, Ruoyu and Kruegel, Christopher and Vigna, Giovanni and Bruschi, Danilo and Lanzi,
|
|
Andrea},
|
|
year = {2019},
|
|
month = {03},
|
|
pages = {315-325},
|
|
title = {BootKeeper: Validating Software Integrity Properties on Boot Firmware Images},
|
|
doi = {10.1145/3292006.3300026}
|
|
}
|
|
|
|
@inproceedings{butterworth13,
|
|
author = {Butterworth, John and Kallenberg, Corey and Kovah, Xeno and Herzog, Amy},
|
|
year = {2013},
|
|
month = {11},
|
|
pages = {25-36},
|
|
title = {BIOS chronomancy: Fixing the core root of trust for measurement},
|
|
journal = {Proceedings of the ACM Conference on Computer and Communications Security},
|
|
doi = {10.1145/2508859.2516714}
|
|
}
|
|
|
|
@inproceedings{moghimi20-tpmfail,
|
|
title = {{TPM-FAIL: {TPM} meets Timing and Lattice Attacks}},
|
|
author = {Daniel Moghimi and Berk Sunar and Thomas Eisenbarth and Nadia Heninger},
|
|
booktitle = {29th {USENIX} Security Symposium ({USENIX} Security 20)},
|
|
year = {2020},
|
|
address = {Boston, MA},
|
|
url = {https://www.usenix.org/conference/usenixsecurity20/presentation/moghimi},
|
|
publisher = {{USENIX} Association},
|
|
month = aug,
|
|
}
|
|
|
|
@InProceedings{BriCamChe04,
|
|
author = "Brickell and Camenisch and Chen",
|
|
title = "Direct Anonymous Attestation",
|
|
booktitle = "SIGSAC: 11th ACM Conference on Computer and
|
|
Communications Security",
|
|
publisher = "ACM SIGSAC",
|
|
year = "2004",
|
|
}
|
|
|
|
@online{tcg20,
|
|
author = {},
|
|
year = {2019},
|
|
title = {The TPM Library Specification},
|
|
url = {https://trustedcomputinggroup.org/resource/tpm-library-specification/},
|
|
urldate = {2020-05-16}
|
|
}
|
|
|
|
@online{tcg-efi16,
|
|
author = {},
|
|
year = {2016},
|
|
title = {TCG EFI Protocol Specification},
|
|
url = {https://trustedcomputinggroup.org/resource/tcg-efi-protocol-specification/},
|
|
urldate = {2020-08-01}
|
|
}
|
|
|
|
@online{tcg-pc19,
|
|
author = {},
|
|
year = {2019},
|
|
title = {TCG PC Client Platform Firmware Profile Specification Revision 1.04},
|
|
url = {https://trustedcomputinggroup.org/wp-content/uploads/TCG_PCClientSpecPlat_TPM_2p0_1p04_pub.pdf},
|
|
urldate = {2020-08-01}
|
|
}
|
|
|
|
@online{ima-overview,
|
|
author = {},
|
|
year = {2020},
|
|
title = {Integrity Measurement Architecture (IMA)},
|
|
url = {https://sourceforge.net/p/linux-ima/wiki/Home/},
|
|
urldate = {2020-08-01}
|
|
}
|
|
|
|
@inproceedings{keylime16,
|
|
author = {Schear, Nabil and Cable, Patrick T. and Moyer, Thomas M. and Richard, Bryan and Rudd, Robert},
|
|
title = {Bootstrapping and Maintaining Trust in the Cloud},
|
|
year = {2016},
|
|
isbn = {9781450347716},
|
|
publisher = {Association for Computing Machinery},
|
|
address = {New York, NY, USA},
|
|
url = {https://doi.org/10.1145/2991079.2991104},
|
|
doi = {10.1145/2991079.2991104},
|
|
booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications},
|
|
pages = {65–77},
|
|
numpages = {13},
|
|
location = {Los Angeles, California, USA},
|
|
series = {ACSAC ’16}
|
|
}
|
|
|
|
|
|
|