Efficient Isolation of Trusted Subsystems in Embedded Systems
暂无分享,去创建一个
Frank Piessens | Bart Preneel | Raoul Strackx | B. Preneel | F. Piessens | Raoul Strackx | Frank Piessens
[1] Bernhard Kauer. OSLO: Improving the Security of Trusted Computing , 2007, USENIX Security Symposium.
[2] Michael K. Reiter,et al. Flicker: an execution infrastructure for tcb minimization , 2008, Eurosys '08.
[3] Ariel J. Feldman,et al. Lest we remember: cold-boot attacks on encryption keys , 2008, CACM.
[4] Sean W. Smith,et al. Building a high-performance, programmable secure coprocessor , 1999, Comput. Networks.
[5] F. J. Corbat. INTRODUCTION AND OVERVIEW OF THE MULTICS SYSTEM , 2010 .
[6] Frank Piessens,et al. Breaking the memory secrecy assumption , 2009, EUROSEC '09.
[7] Bennet S. Yee,et al. Using Secure Coprocessors , 1994 .
[8] Wouter Joosen,et al. Code injection in C and C++: a survey of vulnerabilities and countermeasures , 2004 .
[9] Jochen Liedtke,et al. Toward real microkernels , 1996, CACM.
[10] Calton Pu,et al. Reducing TCB complexity for security-sensitive applications: three case studies , 2006, EuroSys.
[11] Michael K. Reiter,et al. Safe Passage for Passwords and Other Sensitive Data , 2009, NDSS.
[12] Robert Tappan Morris,et al. USENIX Association Proceedings of HotOS IX : The 9 th Workshop on Hot Topics in Operating Systems , 2003 .
[13] Dennis Longley,et al. An automatic search for security flaws in key management schemes , 1992, Comput. Secur..
[14] Hovav Shacham,et al. The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86) , 2007, CCS '07.
[15] A. One,et al. Smashing The Stack For Fun And Profit , 1996 .
[16] Úlfar Erlingsson,et al. Low-Level Software Security: Attacks and Defenses , 2007, FOSAD.