Collaborative Monitors for Embedded System Security
暂无分享,去创建一个
[1] Sylvain Guilley,et al. SoCs security: a war against side-channels , 2004, Ann. des Télécommunications.
[2] S. Naffziger,et al. Power and temperature control on a 90-nm Itanium family processor , 2006, IEEE Journal of Solid-State Circuits.
[3] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[4] Dean M. Tullsen,et al. Reducing power with dynamic critical path information , 2001, Proceedings. 34th ACM/IEEE International Symposium on Microarchitecture. MICRO-34.
[5] Tilman Wolf,et al. Reconfigurable Security Support for Embedded Systems , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).
[6] Patrick Schaumont,et al. Domain-Specific Codesign for Embedded Security , 2003, Computer.
[7] Trevor Mudge,et al. MiBench: A free, commercially representative embedded benchmark suite , 2001 .
[8] Lazaros F. Merakos,et al. Security in third Generation Mobile Networks , 2004, Comput. Commun..
[9] Jeannette M. Wing. A call to action look beyond the horizon , 2003, IEEE Security & Privacy Magazine.
[10] Christof Paar,et al. Security on FPGAs: State-of-the-art implementations and attacks , 2004, TECS.
[11] Tom Martin,et al. Mobile phones as computing devices: the viruses are coming! , 2004, IEEE Pervasive Computing.
[12] Srivaths Ravi,et al. Secure embedded processing through hardware-assisted run-time monitoring , 2005, Design, Automation and Test in Europe.
[13] Carla E. Brodley,et al. Heat stroke: power-density-based denial of service in SMT , 2005, 11th International Symposium on High-Performance Computer Architecture.
[14] Margaret Martonosi,et al. Wattch: a framework for architectural-level power analysis and optimizations , 2000, Proceedings of 27th International Symposium on Computer Architecture (IEEE Cat. No.RS00201).
[15] Trent Jaeger,et al. Secure coprocessor-based intrusion detection , 2002, EW 10.
[16] Kevin Skadron,et al. Using performance counters for runtime temperature sensing in high-performance processors , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[17] G. Gogniat,et al. Reconfigurable Security Primitive for Embedded Systems , 2005, 2005 International Symposium on System-on-Chip.
[18] R. Iris Bahar,et al. Combining software and hardware monitoring for improved power and performance tuning , 2003, Seventh Workshop on Interaction Between Compilers and Computer Architectures, 2003. INTERACT-7 2003. Proceedings..
[19] David Zhang,et al. Secure program execution via dynamic information flow tracking , 2004, ASPLOS XI.
[20] Ross J. Anderson. Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .
[21] Kevin Skadron,et al. Monitoring temperature in FPGA based SoCs , 2005, 2005 International Conference on Computer Design.
[22] Tao Zhang,et al. HIDE: an infrastructure for efficiently protecting information leakage on the address bus , 2004, ASPLOS XI.
[23] K. Skadron,et al. Potential thermal security risks , 2005, Semiconductor Thermal Measurement and Management IEEE Twenty First Annual IEEE Symposium, 2005..
[24] Markus G. Kuhn,et al. Low Cost Attacks on Tamper Resistant Devices , 1997, Security Protocols Workshop.
[25] Jean-Jacques Quisquater,et al. Power Analysis of FPGAs: How Practical is the Attack? , 2003, FPL.
[26] Jeannette M. Wing,et al. Tools for Generating and Analyzing Attack Graphs , 2003, FMCO.