[1]Wang Juan, Shi Yuan, Peng Guojun, et al. Survey on key technology development and application in trusted computing[J]. China Communications, 2016, 13(11): 7090[2]Dong Wei, Chen Liqian. Recent advances on trusted computing in China[J]. Computer Science, 2012, 57(35): 45294532[3]Feng Dengguo, Qin Yu, Feng Wei. The theory and practice in the evolution of trusted computing[J]. Computer Science and Technology, 2014, 59(32): 41734189[4]Zhu Jie, Lin Guoyuan, You Fucheng, et al. Multiway dynamic trust chain model on virtual machine for cloud computing[J]. China Communications, 2016, 13(7): 8391[5]沈昌祥, 张焕国, 王怀民, 等. 可信计算的研究与发展[J]. 中国科学: 信息科学, 2010, 40(2): 139166[6]国家密码管理局. GBT 29829—2013信息安全技术 可信计算密码支撑平台功能与接口规范[S] . 北京: 国家密码管理局, 2007[7]何凡. 可信计算支撑软件的分析与测试研究[D]. 武汉: 武汉大学, 2013[8]周天阳, 朱俊虎, 王清贤. 基于VMM的Rootkit及其监测技术研究[J]. 计算机科学, 2011, 12(38): 7780[9]Balduzzi M, Zaddach J, Balzarotti D, et al. A security analysis of amazons elastic compute cloud service[C] Proc of the 27th Annual ACM Symp on Applied Computing. New York: ACM, 2012: 14271434[10]蒋学渊, 李明禄, 翁楚良. 虚拟机动态迁移中的安全分析[J].计算机科学与探索, 2011, 5(5): 452457[11]Danev B, Masti R, Karame G, et al. Enabling secure VMvTPM migration in private clouds[C] Proc of the 27th Annual Computer Security Applications Conf. New York: ACM, 2011: 187196[12]Aviram A, Hu S, Ford B, et al. Determinating timing channels in compute clouds[C] Proc of the ACM Workshop on Cloud Computing Security Workshop. New York: ACM, 2010: 103108[13]ElAtawy A, Duan Q, AlShaer E. A novel class of robust covert channels using outoforder packets[J]. IEEE Trans on Dependable and Secure Computing, 2017, 14(2): 116129[14]Lin Y, Malik S, Bilal K, et al. Designing and modeling of covert channels in operating systems[J]. IEEE Trans on Computers, 2016, 65(6): 17061719[15]Sailer R, Valdez E, Jaeger T, et al. sHype: Secure hypervisor approach to trusted virtualized systems, RC23511[R]. New York: IBM Research, 2005[16]Payneb D, Carbone M, Sharifm, et al. Lares: An architecture for secure active monitoring using virtualization[C] Proc of the IEEE Symp on Security and Privacy. Piscataway, NJ: IEEE, 2008: 233247
|