Loading...
Please wait, while we are loading the content...
Similar Documents
Flicker: An Execution Infrastructure for TCB Minimization (2008)
| Content Provider | CiteSeerX |
|---|---|
| Author | Isozaki, Hiroshi Perrig, Adrian Reiter, Michael K. Mccune, Jonathan M. Parno, Bryan |
| Description | PROCEEDINGS OF THE ACM EUROPEAN CONFERENCE ON COMPUTER SYSTEMS (EUROSYS) |
| Abstract | We present Flicker, an infrastructure for executing securitysensitive code in complete isolation while trusting as few as 250 lines of additional code. Flicker can also provide meaningful, fine-grained attestation of the code executed (as well as its inputs and outputs) to a remote party. Flicker guarantees these properties even if the BIOS, OS and DMAenabled devices are all malicious. Flicker leverages new commodity processors from AMD and Intel and does not require a new OS or VMM. We demonstrate a full implementation of Flicker on an AMD platform and describe our development environment for simplifying the construction of Flicker-enabled code. |
| File Format | |
| Publisher Date | 2008-01-01 |
| Access Restriction | Open |
| Subject Keyword | Securitysensitive Code Dmaenabled Device Full Implementation Present Flicker New Commodity Processor Amd Platform Remote Party Fine-grained Attestation New O Complete Isolation Execution Infrastructure Development Environment Additional Code Flicker-enabled Code Tcb Minimization |
| Content Type | Text |
| Resource Type | Proceeding |