Indexed by:
Abstract:
To test the security of trusted computing platform, a method using the field program gate array to build a monitor platform was proposed. By monitoring, tampering with and forging input data etc, this method deceived the trusted platform module (TPM) of the passive working mode, doing attacking experiments to the existing trusted platform and TPM. Result of this experiment proves that the existence of man in the middle attack in trusted platform.
Keyword:
Reprint Author's Address:
Email:
Source :
Journal of Beijing University of Technology
ISSN: 0254-0037
Year: 2013
Issue: 1
Volume: 39
Page: 70-75
Cited Count:
WoS CC Cited Count: 0
SCOPUS Cited Count:
ESI Highly Cited Papers on the List: 0 Unfold All
WanFang Cited Count:
Chinese Cited Count:
30 Days PV: 4
Affiliated Colleges: