MEASURING INTEGRITY OF COMPUTING SYSTEM

作者: Edwards Nigel , Ndu Geoffrey , Luciani Jr Luis , Altobelli David

DOI:

关键词:

摘要: Examples disclosed herein relate to integrity monitoring of a computing system. Trust state information is verified. Kernel code and module are loaded into memory that accessible device separate from processor loads the kernel code. A measurement verified memory. The can correspond multiple symbols. measure corresponding each respective symbols generate set initial measurements. measurements be provided for monitoring.

参考文章(43)
Thomas E. Buckeyne, Ronald A. Cadima, Anthony E. Green, Anand Singh, Pravinkumar Patel, Robert W. Crowder, Authentication and validation systems for gaming devices ,(2009)
Anthony Green, Robert Crowder, Data Integrity and Non-Repudiation ,(2007)
Vernon W. Hamlin, Jorge L. Shimabukuro, Craig J. Sylla, Stephen A. Canterbury, Scot W. Salzman, Computer bios protection and authentication ,(2011)
Quy N. Hoang, Shawn J. Dube, Muhammed K. Jaber, Theodore S. Webb, Arbitrary code execution and restricted protected storage access to trusted code ,(2012)
David Plaquin, Serdar Cabuk, Christopher Ian Dalton, Dynamic trust management ,(2008)
Vedvyas Shanbhogue, Arvind Kumar, Purushottam Goel, Ned M. Smith, Providing Integrity Verification And Attestation In A Hidden Execution Environment ,(2010)
Mehdi-Laurent Akkar, Aymeric Vial, Narendar M. Shankar, Steven C. Goss, Gregory Remy Philippe Conti, Methods, apparatus, and systems for secure demand paging and other paging operations for processor devices ,(2014)
Sumit Gwalani, Luigi Semenzato, William A. Drewry, Gaurav Shah, Ryan Tabone, Randall Spangler, Firmware verified boot ,(2010)