When IMA/EVM collides with systems administration
Resumo
This article does not have an abstract.
Referências
Cohen, J. C. and Acharya, S. (2012). Incorporating hardware trust mechanisms in apache hadoop... In 2012 IEEE Globecom Workshops, pages 769–774.
IBM (2023). IMA Policy. [link]. Accessed: Jun 25, 2025.
Linux M. (2008). IMA Policy. [link]. Accessed: April 14, 2025.
Ozga, W., Quoc, D. L., and Fetzer, C. (2020). A practical approach for updating an integrity-enforced operating system. In Proceedings of the 21st International Middleware Conference, Middleware ’20, page 311–325, New York, NY, USA. ACM.
Yocto (2021). Ima/evm integration. [link]. Accessed June 2025.
IBM (2023). IMA Policy. [link]. Accessed: Jun 25, 2025.
Linux M. (2008). IMA Policy. [link]. Accessed: April 14, 2025.
Ozga, W., Quoc, D. L., and Fetzer, C. (2020). A practical approach for updating an integrity-enforced operating system. In Proceedings of the 21st International Middleware Conference, Middleware ’20, page 311–325, New York, NY, USA. ACM.
Yocto (2021). Ima/evm integration. [link]. Accessed June 2025.
Publicado
01/09/2025
Como Citar
PINTO, Rossano P.; PIERINI, Rodrigo A. A.; TEIXEIRA, Caio; RAMPAZZO, Felipe J. A.; PEREIRA, Diego S.; IMMICH, Roger; ROTHENBERG, Christian E.; HENRIQUES, Marco A. A..
When IMA/EVM collides with systems administration. In: RESUMOS EXPANDIDOS - SIMPÓSIO BRASILEIRO DE CIBERSEGURANÇA (SBSEG), 25. , 2025, Foz do Iguaçu/PR.
Anais [...].
Porto Alegre: Sociedade Brasileira de Computação,
2025
.
p. 348-349.
DOI: https://doi.org/10.5753/sbseg_estendido.2025.11410.
