Entry Gotzfried:2014:MAT from tissec.bib
Last update: Sun Oct 15 02:58:48 MDT 2017
Top |
Symbols |
Numbers |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Gotzfried:2014:MAT,
author = "Johannes G{\"o}tzfried and Tilo M{\"u}ller",
title = "Mutual Authentication and Trust Bootstrapping towards
Secure Disk Encryption",
journal = j-TISSEC,
volume = "17",
number = "2",
pages = "6:1--6:??",
month = nov,
year = "2014",
CODEN = "ATISBQ",
DOI = "https://doi.org/10.1145/2663348",
ISSN = "1094-9224 (print), 1557-7406 (electronic)",
ISSN-L = "1094-9224",
bibdate = "Wed Nov 19 12:26:42 MST 2014",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
http://www.math.utah.edu/pub/tex/bib/tissec.bib",
abstract = "The weakest link in software-based full disk
encryption is the authentication procedure. Since the
master boot record must be present unencrypted in order
to launch the decryption of remaining system parts, it
can easily be manipulated and infiltrated by bootkits
that perform keystroke logging; consequently,
password-based authentication schemes become
attackable. The current technological response, as
enforced by BitLocker, verifies the integrity of the
boot process by use of the trusted platform module.
But, as we show, this countermeasure is insufficient in
practice. We present STARK, the first tamperproof
authentication scheme that mutually authenticates the
computer and the user in order to resist keylogging
during boot. To achieve this, STARK implements trust
bootstrapping from a secure token to the whole PC. The
secure token is an active USB drive that verifies the
integrity of the PC and indicates the verification
status by an LED to the user. This way, users can
ensure the authenticity of the PC before entering their
passwords.",
acknowledgement = ack-nhfb,
articleno = "6",
fjournal = "ACM Transactions on Information and System Security",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J789",
}
Related entries
- achieve,
9(2)181,
11(2)4,
11(4)18,
12(1)4,
12(1)6,
13(4)38,
14(1)5,
15(2)7,
16(2)6,
17(3)12,
18(4)12
- active,
5(4)492,
15(1)5,
15(2)9,
15(3)14,
18(3)9
- authenticate,
2(2)138,
11(3)14,
13(4)39
- authentication,
1(1)3,
2(2)138,
2(2)159,
2(2)177,
2(3)230,
2(3)332,
2(4)354,
2(4)390,
5(4)367,
5(4)458,
6(2)258,
10(3)10,
10(3)11,
11(2)5,
11(3)14,
11(4)22,
11(4)23,
12(4)21,
13(2)17,
13(4)32,
14(1)5,
14(1)11,
14(4)29,
16(2)6,
16(2)8,
16(4)15,
17(4)14,
18(1)1,
18(3)11,
18(4)14
- based, password-,
9(2)181,
16(2)8,
16(4)15
- based, software-,
16(3)9
- become,
11(2)2,
11(3)14,
12(3)14,
12(4)21,
13(4)36,
14(1)3,
14(3)25,
15(1)4,
16(2)7,
17(4)15,
18(1)2
- bootstrapping,
12(1)2
- computer,
1(1)66,
2(1)34,
2(1)105,
2(2)159,
2(3)230,
2(3)269,
2(3)332,
2(4)354,
2(4)416,
10(2)5,
11(4)20,
12(2)7,
13(2)11,
15(1)1,
15(2)9,
16(2)5
- consequently,
16(2)6
- countermeasure,
12(2)12,
16(1)1,
18(1)2,
18(1)4
- current,
2(1)34,
2(1)65,
2(2)177,
2(4)390,
11(4)18,
11(4)20,
11(4)22,
12(2)8,
12(2)10,
13(3)20,
13(4)35,
15(3)12,
16(3)10,
16(4)13,
16(4)16,
17(1)1,
17(1)2,
17(3)9
- decryption,
10(2)6,
11(2)4
- disk,
13(4)30
- drive,
14(4)32
- during,
1(1)26,
9(4)421,
11(1)3,
11(4)18,
12(2)8,
13(3)25,
15(3)13,
15(4)17,
17(3)10
- easily,
12(1)6,
14(1)7,
14(1)11,
16(4)17,
17(3)11,
17(3)12,
18(4)13
- encryption,
2(3)230,
2(4)416,
6(3)365,
7(1)1,
7(2)206,
9(2)162,
9(3)325,
9(4)461,
10(2)6,
10(4)4,
11(2)4,
13(3)22,
13(4)31,
13(4)33,
13(4)35,
13(4)41,
16(1)2,
16(3)10,
18(1)4,
18(3)10
- enforced,
2(2)177,
13(3)25,
17(1)3,
18(2)8
- ensure,
10(2)7,
10(3)10,
12(2)9,
12(3)14,
12(3)19,
12(4)20,
13(3)21,
13(4)35,
14(1)13,
15(2)10,
17(3)11,
18(1)2
- first,
2(1)34,
2(1)105,
2(4)354,
9(2)181,
10(4)6,
11(2)3,
11(2)4,
11(3)13,
11(4)18,
11(4)22,
12(1)3,
12(1)5,
12(3)18,
12(4)22,
13(4)31,
13(4)32,
14(1)13,
14(3)25,
14(4)30,
14(4)31,
15(4)17,
15(4)18,
16(3)10,
17(1)4,
17(3)11,
18(1)4,
18(3)9,
18(4)12,
18(4)13
- full,
10(4)5,
11(2)6,
13(3)24,
13(3)25,
13(4)37,
15(2)8,
16(3)12
- implement,
2(2)177,
9(4)461,
11(1)3,
11(3)14,
11(3)16,
12(1)4,
12(2)13,
14(1)6,
14(1)10,
14(3)24,
14(4)31,
15(2)6,
16(2)6,
16(2)8,
16(3)10,
16(4)14,
17(3)10
- indicate,
2(3)230,
10(4)2,
12(1)6,
13(4)35,
16(3)11,
18(3)9,
18(4)13
- integrity,
1(1)26,
1(1)93,
2(1)65,
2(1)105,
3(1)51,
10(2)8,
10(3)11,
11(3)14,
12(1)6,
12(3)14,
13(1)4,
13(1)5,
13(3)25,
14(3)24,
17(4)15,
18(2)5
- keystroke,
5(4)367,
8(3)312,
16(2)8
- launch,
16(2)8,
18(2)7
- link,
10(4)6,
11(3)13,
17(1)1
- logging,
2(2)159,
15(2)9
- module,
7(2)175,
13(3)28,
15(4)17,
18(2)7
- must,
2(2)159,
2(2)177,
9(4)421,
10(3)12,
10(4)4,
11(3)13,
13(4)40,
14(4)29,
15(2)10,
16(1)4
- mutually,
10(2)5,
16(2)5,
18(2)5
- order,
1(1)3,
9(2)181,
9(4)391,
9(4)461,
10(1)4,
10(2)5,
10(3)12,
11(2)6,
12(1)1,
12(1)3,
12(3)18,
13(3)24,
15(4)17,
16(1)4,
17(3)11,
18(1)2
- part,
2(3)332,
10(3)9,
10(4)4,
11(2)2,
11(4)20,
12(1)1,
13(1)10,
15(2)8,
15(2)9,
16(4)15,
17(4)16
- password,
1(1)3,
2(3)230,
2(4)390,
10(4)5,
11(4)17,
13(4)37,
16(4)15,
17(4)14,
18(1)1,
18(4)13
- password-based,
9(2)181,
16(2)8,
16(4)15
- perform,
2(2)177,
2(3)269,
9(4)461,
12(2)11,
13(4)40,
15(2)6,
15(2)10,
15(3)14,
15(4)17,
16(1)4,
16(2)8
- platform,
10(4)4,
11(1)3,
11(3)16,
11(4)22,
18(3)11
- practice,
2(1)34,
2(1)65,
11(2)3,
11(3)16,
11(4)17,
12(2)8,
12(3)16,
13(4)34,
14(4)31,
16(2)8,
17(3)10,
17(4)15
- present,
1(1)26,
2(1)3,
2(1)65,
2(2)177,
2(3)230,
2(3)269,
2(3)295,
2(4)354,
7(2)319,
9(2)181,
9(4)461,
10(1)2,
10(2)7,
10(3)10,
10(3)11,
10(3)12,
10(4)2,
10(4)3,
11(1)2,
11(1)4,
11(2)2,
11(2)5,
11(3)14,
11(4)22,
12(1)2,
12(1)4,
12(2)10,
12(2)11,
12(3)14,
12(3)15,
12(3)16,
12(3)17,
12(4)22,
13(1)10,
13(3)20,
13(3)22,
13(3)25,
13(3)28,
13(4)29,
13(4)41,
14(1)4,
14(1)5,
14(1)6,
15(1)2,
15(2)6,
15(2)8,
15(2)10,
15(3)12,
15(3)13,
15(4)16,
15(4)18,
16(2)6,
16(2)7,
16(4)13,
16(4)14,
17(1)4,
17(2)7,
17(2)8,
17(3)9,
17(3)12,
17(4)14,
17(4)15,
17(4)16,
18(1)3,
18(1)4,
18(2)7,
18(3)9,
18(3)10,
18(3)11,
18(4)12,
18(4)14
- procedure,
9(4)421,
11(4)18,
16(1)2,
17(1)1,
17(2)5
- process,
1(1)26,
2(1)65,
9(4)421,
10(3)9,
10(4)4,
11(1)2,
11(1)4,
11(4)18,
11(4)20,
12(2)11,
12(3)14,
13(1)10,
13(3)25,
13(4)36,
15(3)13,
16(2)5,
16(2)7,
17(4)14,
18(1)3
- record,
7(4)576,
16(3)10
- resist,
2(3)230,
18(1)2
- response,
9(4)461,
12(3)17,
17(1)1
- scheme,
7(2)206,
7(4)523,
8(2)228,
9(3)325,
9(4)461,
10(4)5,
11(2)4,
11(2)5,
11(3)14,
11(3)15,
11(4)18,
11(4)22,
12(1)2,
12(1)3,
12(2)9,
12(3)15,
12(3)16,
12(3)18,
13(4)29,
13(4)31,
13(4)37,
13(4)41,
14(1)5,
15(2)9,
15(4)18,
17(3)10,
17(4)14,
17(4)15
- schemes,
3(3)161,
9(1)1,
9(4)461,
10(4)4,
10(4)5,
11(2)1,
11(2)4,
11(2)5,
11(3)15,
11(4)22,
12(1)2,
12(1)3,
12(2)8,
12(3)18,
13(3)25,
13(4)39,
14(1)14,
14(4)29,
15(2)9,
17(1)4,
17(4)15,
18(3)10
- secure,
1(1)93,
2(2)159,
2(2)177,
2(3)332,
2(4)390,
4(1)72,
4(2)103,
4(2)134,
4(4)321,
5(3)290,
6(4)472,
7(4)523,
9(1)1,
9(1)31,
9(1)94,
9(2)162,
9(4)461,
10(2)8,
10(3)10,
10(3)11,
10(4)3,
10(4)6,
11(2)4,
11(2)5,
11(3)13,
11(3)14,
11(4)18,
11(4)22,
11(4)23,
12(1)2,
12(1)3,
12(1)6,
12(3)16,
12(3)18,
12(4)21,
12(4)22,
13(1)9,
13(3)21,
13(3)28,
13(4)29,
14(3)23,
14(3)27,
14(4)31,
15(2)6,
15(2)9,
16(3)11,
16(4)15,
17(2)5,
17(4)13,
18(2)5,
18(4)13
- since,
2(2)177,
11(4)17,
12(2)11,
13(1)10,
13(3)22,
13(4)35,
13(4)37,
13(4)39,
15(2)6,
15(2)10
- software-based,
16(3)9
- status,
11(3)15,
12(1)1
- technological,
15(3)13
- token,
7(3)333,
11(1)2,
17(3)10,
18(3)9
- toward,
10(1)2,
10(4)4,
11(1)3,
12(1)4,
15(2)7,
18(4)14
- trust,
5(2)95,
6(1)1,
7(1)21,
7(3)428,
9(3)352,
9(4)391,
10(3)11,
10(3)12,
10(4)3,
10(4)4,
11(1)2,
12(1)2,
12(1)6,
12(2)8,
13(1)2,
13(1)5,
13(2)16,
14(4)29
- trusted,
2(2)138,
2(3)269,
8(2)153,
10(4)3,
11(2)6,
11(3)14,
12(1)3,
13(4)39,
14(1)8,
14(3)27,
14(4)29,
15(2)9,
16(2)5,
16(2)7,
16(4)15,
18(2)8
- use,
2(1)3,
2(1)105,
2(2)138,
2(2)177,
2(3)230,
2(3)269,
2(3)332,
2(4)354,
2(4)390,
4(2)103,
7(1)21,
9(4)391,
9(4)421,
9(4)461,
10(1)4,
10(2)5,
10(3)11,
10(4)1,
10(4)3,
10(4)5,
10(4)6,
11(1)2,
11(1)3,
11(1)4,
11(2)1,
11(2)4,
11(3)13,
11(3)14,
11(4)18,
11(4)19,
11(4)21,
11(4)22,
12(2)10,
12(3)16,
12(3)18,
13(3)22,
13(3)24,
13(3)25,
13(4)29,
13(4)31,
13(4)36,
14(1)6,
14(1)8,
14(1)10,
14(1)11,
14(4)31,
14(4)32,
15(1)3,
15(1)4,
15(1)5,
15(2)7,
15(3)12,
15(4)15,
15(4)16,
15(4)17,
16(2)8,
16(4)15,
16(4)17,
17(2)5,
17(2)7,
17(2)8,
17(4)15,
17(4)16,
18(1)1,
18(2)6,
18(3)9,
18(4)14
- verification,
2(3)332,
3(1)51,
8(3)287,
10(2)5,
10(2)6,
10(2)7,
10(3)9,
10(3)11,
11(2)5,
11(3)14,
12(1)3,
12(1)6,
14(1)5,
14(3)25,
14(4)32,
15(1)3,
15(2)9,
15(4)18,
16(2)8,
18(2)6,
18(2)8,
18(3)11,
18(4)14
- verify,
2(3)332,
9(4)421,
11(2)5,
11(3)14,
14(1)12,
15(1)3,
16(3)11,
18(2)6,
18(3)11
- way,
2(1)3,
2(1)65,
2(3)230,
2(3)269,
2(4)416,
9(4)461,
10(4)3,
10(4)4,
11(1)2,
11(3)13,
12(1)5,
12(2)8,
12(2)11,
12(3)14,
13(1)10,
13(3)22,
13(3)28,
13(4)34,
15(2)10,
15(4)15,
16(3)10,
16(3)11,
16(4)17
- whole,
10(2)8,
14(1)5