參考文獻 |
[1] A. Francillon and C. Castelluccia, “Code Injection Attacks on Harvard architecture Devices,” Proceeding of the 15th ACM Conference on Computer and Communications of Security, pp. 15-26, 2008.
[2] S. Smith, “Handbook of Financial Cryptography and Security,” Chapmand and Hall/CRC, pp.257-278, 2010.
[3] H. Tan, W. Hu, and S. Jha, “A TPM-enable Remote Attestation Protocol (TRAP) in Wireless Sensor Networks,” Proceeding of the 6th ACM Workshop on Performance Monitoring and Measurement of Heterogeneous Wirekess and Wired Networks, pp. 9-16, 2011.
[4] T. Zhang, J. Szefer, and R.B. Lee, “Security Verification of Hardware-Enabled Attestation Protocols,” Proceeding of the 45th Annual IEEE/ACM International Symposium on Microarchitecture Workshops, pp. 47-54, 2012.
[5] C. Krauβ, F. Stumpf, and C. Eckert, “Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques,” Proceedings of the 4th European Conference on Security and Privacy in Ad-hoc and Sensor Networks, pp. 203-217, 2007.
[6] FIPS 198, “The Keyed-Hash Message Authentication Code (HMAC),” NIST, US Department of Commerce, Washington, D.C., 2002.
[7] A. Seshadri, A. Perrig, L.V. Doorn and P. Khosla, “SWATT: SoftWare-based ATTestation for Embedded Devices,” proceeding of IEEE Symposium on Security and Privacy, pp. 272-282, 2004.
[8] A Seshadri, M. Luk, A. Perrig, L.V. Doorn and P. Khosla “SCUBA: Secure Code Update by Attestation in Sensor Networks,” Proceeding of the 5th ACM Workshop on wireless Security, pp. 85-94, 2006.
[9] A Seshadri, M. Luk, E. Shi, A. Perrig, L.V. Doorn and P. Khosla, “Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems,” Proceeding of the Twentieth ACM Symposium on Operating Systems Principles, pp. 1-16, 2005.
[10] Y. Yang, X. Wang, S. Zhu and G. Gao, “Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks,” Proceeding of the 26th IEEE Symposium on Reliable Distributed System, pp. 219-230, 2007.
[11] T. Abuhmed, N. Nyamaa and D. Nyang, “Software-based Remote Code Attestation in Wireless Sensor Network,” Proceeding of the IEEE Conference on Global Telecommunications, pp. 1-8, 2009.
[12] C. Castelluccia, A. Francillon, D. Perito and C. Soriente, “On the difficulty of Software-based Attestation of Embedded Devices,” Proceeding of the 16th ACM Conference on Computer and Communication Security, pp. 400-409, 2009.
[13] S. Fluhrer, I. Mantin and A. Shamir, “Weakness in the Key Scheduling Algorithm of RC4,” In 8th Annual Workshop on Selected Areas in Cryptography, pp. 1-24, 2001.
[14] S. Marti, T.J. Giuli, K. Lai and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” Proceedings of the 6th Annual International
Conference on Mobile Computing and Networking, pp 255-265, 2000.
[15] A. Shamir, “How to Share a Secret,” Communication of the ACM, Vol. 22, No.11, pp. 612-613, 1979.
[16] B. Parno, “The Trusted Platform Module (TPM) and Sealed Storage”Technical Report, 2007.
[17] D. Schellekens, B. Wyseur and B. Preneel, “Remote Attestation on Legacy Operating System with Trusted Platofrm Modules,” Science of Computer Programming, Vol. 74, Issues 1-2, pp. 13-22, 2008.
[18] A. Klimov and A. Shamir, “New Cryptographic Primitives Based on Multiword T-function,” Fast Software Encryption Workshop, 2004.
[19] M. Mitzenmacher and E. Upfal, Probability and Computing: Randomized Algorithm and Probabilistic Analysis, New York: Cambridge University Press,
pp. 32-34, 2005.
[20] J. Murray and H. Bradley, The Oxford English Dictionary: Being a Corrected Reissue with an Introduction, Supplement, and Bibliography of a New English Dictionary on Historic Principles, Founded Mainly on the Materials Collected by the Philological Society, Oxford: At the Clarendon Press, 1933.
[21] E.W. Weisstein, “Primitive Polynomial,” MathWorld – A Wolfram Web Resource. http://mathworld.wolfram.com/PrimitivePolynomial.html
[22] R.C. Tausworthe, “Random Numbers Generated by Linear Recurrence Modulo Two” Mathematics of Computation, pp. 201-209, 1965.
[23] B. Rosenberg, Handbook of Financial Cryptography and Security, Chapman and Hall/CRC, pp. 257-274, 2010.
|