[1] |
Trusted Computing Group.TPM Main Specification Version 1.2, Part 1 Design Principles[EB/OL]. . 2007.
|
[2] |
Trusted Computing Group. TCG Specification Architecture Overview Revision 1.4[EB/OL]. . 2007.
|
[3] |
赵波, 张焕国, 李晶. 可信PDA计算平台系统结构与安全机制[J]. 计算机学报, 2010, 33(1): 82-92.
|
[4] |
LI C, LI R, ZHUANG L, ZHANG X.Formal Analysis of Trust Chain[C]//IEEE. International Conference on Networks Security Wireless Communications and Trusted Computing, April 24-25, 2010, Huazhong University of Science and Technology, Wuhan. Los Alamitos, CA: IEEE Computer Society, 2000: 111-116.
|
[5] |
BISHOP M, DILGER M.Checking for Race Conditions in File Accesses[J]. Computing Systems, 1996, 2(2):131-152.
|
[6] |
DAVI L, SADEGHI A-R, WINANDY M.Dynamic Integrity Measurement and Attestation: Towards Defense Against Return-Oriented Programming Attacks[C]//ACM. Workshop on Scalable Trusted Computing, November 9-13, 2009, Hyatt Regency Chicago,Chicago, IL. New York, NY: ACM, 2009: 49-54.
|
[7] |
古亮, 郭耀, 王华, 等. 基于TPM的运行时软件可信证据收集机制[J]. 软件学报, 2010, 21(2): 373-387.
|
[8] |
RUSSINOVICH M, SOLOMON D A, IONESCU A. Windows Internals, Sixth Edition, Part 2[M]. Redmond, Washington: Microsoft Press, 2012.
|
[9] |
邢彬, 韩臻, 常晓林,等. 基于虚拟机监控技术的可信虚拟域[J]. 信息安全学报, 2016, 1(1): 75-94.
|
[10] |
SAILER R, ZHANG X, JAEGER T, VAN DOORN L.Design and Implementation of a TCG-based Integrity Measurement Architecture[C]//USENIX.Security Symposium, August 9-13, 2004, Town & Country Resort and Convention Center, San Diego, CA. Berkeley, CA: USENIX Association Berkeley, 2004: 223-238.
|