{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T07:39:23Z","timestamp":1768549163239,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540689782","type":"print"},{"value":"9783540689799","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-68979-9_2","type":"book-chapter","created":{"date-parts":[[2008,8,12]],"date-time":"2008-08-12T12:02:26Z","timestamp":1218542546000},"page":"14-32","source":"Crossref","is-referenced-by-count":34,"title":["TOCTOU, Traps, and Trusted Computing"],"prefix":"10.1007","author":[{"given":"Sergey","family":"Bratus","sequence":"first","affiliation":[]},{"given":"Nihal","family":"D\u2019Cunha","sequence":"additional","affiliation":[]},{"given":"Evan","family":"Sparks","sequence":"additional","affiliation":[]},{"given":"Sean W.","family":"Smith","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"Trusted Computing Group: Homepage, \n                    \n                      http:\/\/www.trustedcomputinggroup.org"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Proudler, G.: Concepts of Trusted Computing. In: Mitchell, C. (ed.) Trusted Computing, IET, pp. 11\u201327 (2005)","DOI":"10.1049\/PBPC006E_ch2"},{"key":"2_CR3","doi-asserted-by":"publisher","first-page":"1052","DOI":"10.1109\/ARES.2007.114","volume-title":"ARES 2007: Proceedings of the The Second International Conference on Availability, Reliability and Security","author":"S. Bratus","year":"2007","unstructured":"Bratus, S., Ferguson, A., McIlroy, D., Smith, S.: Pastures: Towards Usable Security Policy Engineering. In: ARES 2007: Proceedings of the The Second International Conference on Availability, Reliability and Security, Washington, DC, USA, pp. 1052\u20131059. IEEE Computer Society, Los Alamitos (2007)"},{"key":"2_CR4","unstructured":"Sadeghi, A.R., St\u00fcble, C.: Property-Based Attestation for Computing Platforms: Caring about Properties, not Mechanisms. In: New Security Paradigms Workshop (2004)"},{"issue":"3","key":"2_CR5","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1109\/MSP.2004.25","volume":"2","author":"I. Arce","year":"2004","unstructured":"Arce, I.: The Kernel Craze. IEEE Security and Privacy\u00a02(3), 79\u201381 (2004)","journal-title":"IEEE Security and Privacy"},{"key":"2_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1007\/11533733_12","volume-title":"Public Key Infrastructure","author":"M. Franklin","year":"2005","unstructured":"Franklin, M., Mitcham, K., Smith, S.W., Stabiner, J., Wild, O.: CA-in-a-Box. In: Chadwick, D., Zhao, G. (eds.) EuroPKI 2005. LNCS, vol.\u00a03545, pp. 180\u2013190. Springer, Heidelberg (2005)"},{"key":"2_CR7","unstructured":"Xen: Virtual Machine Monitor, \n                    \n                      http:\/\/www.cl.cam.ac.uk\/Research\/SRG\/netos\/xen\/"},{"key":"2_CR8","unstructured":"Bochs: IA-32 Emulator Project, \n                    \n                      http:\/\/bochs.sourceforge.net\/"},{"key":"2_CR9","unstructured":"QEMU: Open Source Processor Emulator, \n                    \n                      http:\/\/www.qemu.com\/"},{"key":"2_CR10","unstructured":"Strasser, M.: Software-based TPM Emulator for Linux. Department of Computer Science. Swiss Federal Institute of Technology Zurich (2004)"},{"key":"2_CR11","unstructured":"Berger, S., Caceres, R., Goldman, K., Perez, R., Sailer, R., van Doorn, L.: vTPM \u2013 Virtualizing the Trusted Platform Module. In: 15th Usenix Security Symposium, pp. 305\u2013320 (2006)"},{"key":"2_CR12","unstructured":"D\u2019Cunha, N.: Exploring the Integration of Memory Management and Trusted Computing. Technical Report TR2007-594, Dartmouth College, Computer Science, Hanover, NH (May 2007)"},{"key":"2_CR13","unstructured":"Kursawe, K., Schellekens, D., Preneel, B.: Analyzing trusted platform communication (2005), \n                    \n                      http:\/\/www.esat.kuleuven.be\/cosic\/"},{"key":"2_CR14","unstructured":"Sadeghi, A.R., Selhorst, M., St\u00fcble, C., Wachsmann, C., Winandy, M.: TCG Inside - A Note on TPM Specification Compliance."},{"key":"2_CR15","unstructured":"Kauer, B.: OSLO: Improving the security of Trusted Computing. Technical report, Technische Universitat Dresden, Department of Computer Science (A later version appeared at USENIX Security 2007) (2007)"},{"key":"2_CR16","unstructured":"Sparks, E.: TPM Reset Attack, \n                    \n                      http:\/\/www.cs.dartmouth.edu\/~pkilab\/sparks\/"},{"key":"2_CR17","unstructured":"Greene, T.: Integrity of hardware-based computer security is challenged. NetworkWorld (June 2007)"},{"key":"2_CR18","unstructured":"Sparks, E.: A Security Assessment of Trusted Platform Modules. Technical Report TR2007-597, Dartmouth College, Computer Science, Hanover, NH (June 2007)"},{"key":"2_CR19","unstructured":"Boneh, D., Brumley, D.: Remote Timing Attacks are Practical. In: Proceedings of the 12th USENIX Security Symposium (2003)"},{"key":"2_CR20","unstructured":"Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and Implementation of a TCG-based Integrity Measurement Architecture. In: USENIX Security Symposium, pp. 223\u2013238 (2004)"},{"key":"2_CR21","series-title":"Lecture Notes in Computer Science","first-page":"294","volume-title":"Advances in Computer Systems Architecture","author":"J. Marchesini","year":"2004","unstructured":"Marchesini, J., Smith, S.W., Wild, O., Stabiner, J., Barsamian, A.: Open-Source Applications of TCPA Hardware. In: Yew, P.-C., Xue, J. (eds.) ACSAC 2004. LNCS, vol.\u00a03189, pp. 294\u2013303. Springer, Heidelberg (2004)"},{"key":"2_CR22","unstructured":"Marchesini, J., Smith, S.W., Wild, O., MacDonald, R.: Experimenting with TCPA\/TCG Hardware, Or: How I Learned to Stop Worrying and Love The Bear. Technical Report TR2003-476, Dartmouth College, Computer Science, Hanover, NH (December 2003)"},{"key":"2_CR23","unstructured":"Haldar, V., Chandra, D., Franz, M.: Semantic Remote Attestation: A Virtual Machine Directed Approach to Trusted Computing. In: USENIX Virtual Machine Research and Technology Symposium (2004)"},{"key":"2_CR24","unstructured":"Petrom Jr., N.L., Fraser, T., Molina, J., Arbaugh, W.A.: Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor. In: 13th USENIX Security Symposium, pp. 179\u2013194 (2004)"},{"key":"2_CR25","doi-asserted-by":"crossref","unstructured":"Shi, E., Perrig, A., van Doorn, L.: BIND: A Fine-Grained Attestation Service for Secure Distributed Systems. In: IEEE Symposium on Security and Privacy, pp. 154\u2013168 (2005)","DOI":"10.1109\/SP.2005.4"},{"key":"2_CR26","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1145\/1346281.1346284","volume-title":"Proceedings of the 13th international conference on Architectural support for programming languages and operating systems","author":"X. Chen","year":"2008","unstructured":"Chen, X., Garfinkel, T., Lewis, E.C., Subrahmanyam, P., Waldspurger, C.A., Boneh, D., Dwoskin, J., Ports, D.R.: Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems. In: Proceedings of the 13th international conference on Architectural support for programming languages and operating systems, pp. 2\u201313. ACM, New York (2008)"},{"key":"2_CR27","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1145\/1294261.1294294","volume-title":"SOSP 2007: Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles","author":"A. Seshadri","year":"2007","unstructured":"Seshadri, A., Luk, M., Qu, N., Perrig, A.: SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. In: SOSP 2007: Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles, pp. 335\u2013350. ACM, New York (2007)"},{"key":"2_CR28","unstructured":"Cabuk, S., Plaquin, D., Dalton, C.I.: A Dynamic Trust Management Solution for Platform Security Using Integrity Measurements. Technical report, Hewlett-Packard Laboratories (April 2007)"}],"container-title":["Lecture Notes in Computer Science","Trusted Computing - Challenges and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-68979-9_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T04:21:25Z","timestamp":1620015685000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-68979-9_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540689782","9783540689799"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-68979-9_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[]}}