收录:
摘要:
To test the security of trusted computing platform, a method using the field program gate array to build a monitor platform was proposed. By monitoring, tampering with and forging input data etc, this method deceived the trusted platform module (TPM) of the passive working mode, doing attacking experiments to the existing trusted platform and TPM. Result of this experiment proves that the existence of man in the middle attack in trusted platform.
关键词:
通讯作者信息:
电子邮件地址: