[1] |
Trusted computing group.TCG specification architecture overview[EB/OL]. .
|
[2] |
WANG X , MIZUNO M , NEILSEN M ,et al. Secure RTOS architecture for building automation[C]// ACM Workshop on Cyber-Physical Systems-Security and/or Privacy. 2015: 79-90.
|
[3] |
YU Z , WANG Q , ZHANG W ,et al. A cloud certificate authority architecture for virtual machines with trusted platform module[C]// IEEE International Conference on High Performance Computing and Communications. 2015: 1377-1380.
|
[4] |
TIAN J , BUTLER K , MCDANIEL P ,et al. Securing ARP from the ground up[C]// The 5th ACM Conference on Data and Application Security and Privacy. 2015: 305-312.
|
[5] |
SHAO J,QIN Y , FENG D ,et al. Formal analysis of enhanced authorization in the TPM 2.0[C]// The 10th ACM Symposium on Information,Computer and Communications Security. 2015: 273-284.
|
[6] |
WANG W , QIN Y , FENG D . Automated proof for authorization protocols of TPM 2.0 in computational model information security practice and experience[M]. Berlin:Springer. 2014 144-158.
|
[7] |
DELAUNE S , KREMER S , RYAN M D ,et al. A formal analysis of authentication in the TPM[C]// The International Conference on Formal Aspects of Security and Trust. 2010: 111-125.
|
[8] |
BAIER C , KATOEN J . Principles of model checking[M]. London: The MIT PressPress, 2008: 595-663.
|
[9] |
NAVABPOUR S , JOSHI Y , WU W ,et al. RiTHM:a tool for enabling time-triggered runtime verification for C programs[C]// Joint Meeting on Foundations of Software Engineering. 2013: 603-606.
|
[10] |
BIEMAN J M , DREILINGER D , LIN L . Using fault injection to increase software test coverage[C]// The Seventh International Symposium on Software Reliability Engineering,IEEE Computer Society. 1996:166.
|