[1]
Gannon D: Head in the clouds. Nature, 449, (2007)
Google Scholar
[2]
Shen Changxiang, Zhang Huanguo, Feng Dengguo, et al: Survey of Information Security. Science in China Series F, 50(3), pp.273-298, (2007)
Google Scholar
[3]
Shen Changxiang, Zhang Huanguo, Wang Huaimin, et al. Research of Trusted Computing and its development. Science in China (information), 40, pp.139-166, (2010)
Google Scholar
[4]
ZHAO Bo, ZHANG Huan-Guo, LI Jing, CHEN Lu, WEN Song. The System Architecture and Security Structure of Trusted PDA. Chinese Journal of Computers, 33(1), pp.82-92, (2010)
DOI: 10.3724/sp.j.1016.2010.00082
Google Scholar
[5]
Xbox 360 hypervisor privilege escalation vulnerability," on http://www.honline.com/security/news/item/Xbox-360-hack-was-the-real-deal-732391.html. (2007)
Google Scholar
[6]
CVE-2007-4993: Xen guest root can escape to domain 0 through pygrub," on http://cve.mitre.org/cgibin/cvename.cgi?name=CVE-2007-4993.(2007)
Google Scholar
[7]
"CVE-2007-5497: Vulnerability in XenServer could result in privilege escalation and arbitrary code executionr," on http://support.citrix.com/article/CTX118766.(2007)
Google Scholar
[8]
R. Wojtczuk, "Subverting the Xen hypervisor," BlackHat USA, 2008.
Google Scholar
[9]
K. Kortchinsky, "Hacking 3D (and Breaking out of VMWare)," BlackHat USA, 2009.
Google Scholar
[10]
Trusted Computing Group on http://www.trustedcomputinggroup.org, June (2004)
Google Scholar
[11]
TCG Web Site on https://www.trustedcomputinggroup.org
Google Scholar
[12]
TCG Specification list on https://www.trustedcomputinggroup.org/specs
Google Scholar
[13]
TCG,"TPM Main Part 2 TPM Structures ", Specification Version 1.2. www.trustedcomputinggroup.org/. (2005)
Google Scholar
[14]
LaGrande Technology Architectural Overview," on http:// www.intel.com/technology/security/. (2003)
Google Scholar
[15]
Microsoft, "Next-Generation Secure Computing Base," on http:// www.microsoft.com/resources/ngscb/. (2004)
Google Scholar
[16]
J. Camenisch: Better Privacy for Trusted Computing Platforms. Proceedings of ESORICS 2004, LNCS 3193, Springer-Verlag , pp.73-88, (2004)
Google Scholar
[17]
T. Eisenbarth, T. Güneysu, C. Paar: Reconfigurable Trusted Computing in Hardware, Proceedings of STC'07, ACM Press, pp.15-20, (2007)
DOI: 10.1145/1314354.1314360
Google Scholar
[18]
P. James, D. Rivera: Systems, Methods, and Media for Accessing TPM Keys, US2006129824. (2004)
Google Scholar
[19]
Z. Yan, P. Cofta: A Mechanism for Trust Sustainability Among Trusted Computing Platforms, Proceedings of TrustBus 2004, LNCS 3184, Springer-Verlag, pp.11-19,( 2004)
DOI: 10.1007/978-3-540-30079-3_2
Google Scholar
[20]
TCG. TCG mobile trusted module specification version 1.0[EB/OL].Oregon:TCG,2007 [2007209201]. http://www.trusted computinggroup.org/specs/mobilephone/tcg2mobile2t rusted2module 21.0.pdf .
DOI: 10.1016/b978-075067960-2/50002-6
Google Scholar
[21]
ZHENG Yu,HE Da-Ke,HE Ming-Xing: Trusted Computing Based User Authentication for Mobile Equipment. Chinese Journal of Computers ,29 (8) , p.1255 – 1264,( 2006)
Google Scholar
[22]
CHEN Shu-yi, WEN Ying-you, ZHAO Hong: Conceptual Design of Trusted Mobile Platform. Journal of Northeastern University(Natural Science), Vol129 ,No. 8 Aug, (2008)
Google Scholar
[23]
WANG Yu, WANG Zhen-yu, YAO Li-ning: Design and implementation of TPM extension and trusted bootstrap on embedded platform. Computer Engineering and Design, 30 (9), pp.2089-2091, (2009)
Google Scholar
[24]
Sun Yong, Chen Wei, Yang Yixian: Trust Computing of Embedded System. China Information Tion Security, 2006.9, pp.50-52, (2006)
Google Scholar
[25]
P. Gutmann,: An Open-source Cryptographic Coprocessor, Proc. of 2000 USENIX Security Symp., (2000)
Google Scholar
[26]
D. Lie, C. Thekkath, M. Mitchell, P. Lincoln, D. Boneh, J. Mitchell, and M. Horowitz: Architectural Support for Copy and Tamper Resistant Software, Proc. of the 9th Int'l Conf. on Architectural Support for Programming Languages and Operating Systems (ASPLOS-IX)., pp.168-177, (2000)
DOI: 10.1145/378993.379237
Google Scholar
[27]
G. E. Suh, D. Clarke, B. Gassend, M. van Dijk, and S. Devadas: AEGIS: Architecture for Tamper-Evident and Tamper-Resistant Processing, Proc. of the 17th Int'l Conf. on Supercomputing (ICS), (2003)
DOI: 10.1145/782814.782838
Google Scholar