Remote Software-Based Attestation for Wireless Sensors
暂无分享,去创建一个
Yongdae Kim | Vishal Kher | Mark Shaneck | Karthikeyan Mahadevan | Yongdae Kim | Vishal Kher | Mark Shaneck | Karthikeyan Mahadevan
[1] Barbara G. Ryder,et al. Pointer-induced aliasing: a problem classification , 1991, POPL '91.
[2] Frederick B. Cohen,et al. Operating system protection through program evolution , 1993, Comput. Secur..
[3] G. Ramalingam,et al. The undecidability of aliasing , 1994, TOPL.
[4] David Aucsmith,et al. Tamper Resistant Software: An Implementation , 1996, Information Hiding.
[5] Christian S. Collberg,et al. A Taxonomy of Obfuscating Transformations , 1997 .
[6] Susan Horwitz,et al. Precise flow-insensitive may-alias analysis is NP-hard , 1997, TOPL.
[7] Clark Thomborson,et al. Manufacturing cheap, resilient, and stealthy opaque constructs , 1998, POPL '98.
[8] Robert Szewczyk,et al. System architecture directions for networked sensors , 2000, ASPLOS IX.
[9] Dan Boneh,et al. Architectural support for copy and tamper resistant software , 2000, SIGP.
[10] Jack W. Davidson,et al. Software Tamper Resistance: Obstructing Static Analysis of Programs , 2000 .
[11] Satoshi Hada,et al. Zero-Knowledge and Code Obfuscation , 2000, ASIACRYPT.
[12] Amit Sahai,et al. On the (im)possibility of obfuscating programs , 2001, JACM.
[13] Mikhail J. Atallah,et al. Protecting Software Code by Guards , 2001, Digital Rights Management Workshop.
[14] Robert E. Tarjan,et al. Dynamic Self-Checking Techniques for Improved Tamper Resistance , 2001, Digital Rights Management Workshop.
[15] Gregory Wroblewski,et al. General Method of Program Code Obfuscation , 2002 .
[16] Christian S. Collberg,et al. Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection , 2002, IEEE Trans. Software Eng..
[17] A. Miyaji,et al. Software Tamper Resistance Based on the Difficulty of Interprocedural Analysis , 2002 .
[18] Srinivas Devadas,et al. Controlled physical random functions , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[19] Jun Yang,et al. Fast Secure Processor for Inhibiting Software Piracy and Tampering , 2003, MICRO.
[20] Leah H. Jamieson,et al. Establishing the Genuinity of Remote Computer Systems , 2003, USENIX Security Symposium.
[21] Atsuko Miyaji,et al. Software Obfuscation on a Theoretical Basis and Its Implementation , 2003, IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences.
[22] Blaise L. P. Gassend,et al. Physical random functions , 2003 .
[23] Vladimir A. Zakharov,et al. On the Possibility of Provably Secure Obfuscating Programs , 2003, Ershov Memorial Conference.
[24] Saumya K. Debray,et al. Obfuscation of executable code to improve resistance to static disassembly , 2003, CCS '03.
[25] Marten van Dijk,et al. AEGIS: architecture for tamper-evident and tamper-resistant processing , 2003, ICS '03.
[26] William A. Arbaugh,et al. Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor , 2004, USENIX Security Symposium.
[27] Pradeep K. Khosla,et al. SWATT: softWare-based attestation for embedded devices , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[28] Trent Jaeger,et al. Attestation-based policy enforcement for remote access , 2004, CCS '04.
[29] Leah H. Jamieson,et al. AN ANALYSIS OF PROPOSED ATTACKS AGAINST GENUINITY TESTS , 2004 .
[30] Tao Zhang,et al. HIDE: an infrastructure for efficiently protecting information leakage on the address bus , 2004, ASPLOS XI.
[31] J. Doug Tygar,et al. Side Effects Are Not Sufficient to Authenticate Software , 2004, USENIX Security Symposium.
[32] David E. Culler,et al. Incremental network programming for wireless sensors , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[33] Christopher Krügel,et al. Static Disassembly of Obfuscated Binaries , 2004, USENIX Security Symposium.
[34] Amit Sahai,et al. Positive Results and Techniques for Obfuscation , 2004, EUROCRYPT.
[35] T Kuennen. SMALL SCIENCE WILL BRING BIG CHANGES TO ROADS , 2004 .
[36] Paul C. van Oorschot,et al. A generic attack on checksumming-based software tamper resistance , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[37] Elaine Shi,et al. BIND: a fine-grained attestation service for secure distributed systems , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).