Performance Study of a Compiler/Hardware Approach to Embedded Systems Security
暂无分享,去创建一个
Alok N. Choudhary | Bhagirath Narahari | Rahul Simha | Kripashankar Mohan | Paul Ott | Joseph Zambreno
[1] Todd M. Austin,et al. SimpleScalar: An Infrastructure for Computer System Modeling , 2002, Computer.
[2] Paul C. van Oorschot,et al. A generic attack on checksumming-based software tamper resistance , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[3] Christian S. Collberg,et al. A Taxonomy of Obfuscating Transformations , 1997 .
[4] Mikhail J. Atallah,et al. Protecting Software Code by Guards , 2001, Digital Rights Management Workshop.
[5] Nasir D. Memon,et al. SAFE-OPS: An approach to embedded software security , 2005, TECS.
[6] Sean W. Smith,et al. Smart cards in hostile environments , 1996 .
[7] R. Simha,et al. SAFE-OPS : A Compiler / Architecture Approach to Embedded Software Security , 2004 .
[8] Vincent Rijmen,et al. The Block Cipher Rijndael , 1998, CARDIS.