Active Defense Technology of Power Monitoring System With Adaptive Features
暂无分享,去创建一个
[1] Dan Grossman,et al. Safe manual memory management in Cyclone , 2006, Sci. Comput. Program..
[2] Michael Norrish,et al. seL4: formal verification of an OS kernel , 2009, SOSP '09.
[3] Michael K. Reiter,et al. Mitigating Storage Side Channels Using Statistical Privacy Mechanisms , 2015, CCS.
[4] Sanjit A. Seshia,et al. Moat: Verifying Confidentiality of Enclave Programs , 2015, CCS.
[5] Gianpiero Cabodi,et al. Formal Verification of Embedded Systems for Remote Attestation , 2015 .
[6] Victor C. M. Leung,et al. A Time-Ordered Aggregation Model-Based Centrality Metric for Mobile Social Networks , 2018, IEEE Access.
[7] Zhong Shao,et al. CertiKOS: An Extensible Architecture for Building Certified Concurrent OS Kernels , 2016, OSDI.
[8] Abhinav Srivastava,et al. Efficient Monitoring of Untrusted Kernel-Mode Execution , 2011, NDSS.
[9] William A. Arbaugh,et al. An Architecture for Specification-Based Detection of Semantic Integrity Violations in Kernel Dynamic Data , 2006, USENIX Security Symposium.
[10] William A. Arbaugh,et al. Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor , 2004, USENIX Security Symposium.
[11] Eugene H. Spafford,et al. The design and implementation of tripwire: a file system integrity checker , 1994, CCS '94.
[12] Donghai Tian,et al. Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions , 2011, NDSS.
[13] Michael G. Hinchey,et al. Developing Experimental Models for NASA Missions with ASSL , 2009, FMA.
[14] Jing Sun,et al. Testing and Defending Methods Against DOS Attack in State Estimation , 2017 .
[15] Fan Long,et al. Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity , 2015, CCS.
[16] Anthony Hall. Using Formal Methods to Develop an ATC Information System , 1996, IEEE Softw..
[17] Elaine Shi,et al. BIND: a fine-grained attestation service for secure distributed systems , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[18] Jean-Pierre Courtiat,et al. An Experiment in using RT-LOTOS for the Formal Specification and Verification of a Distributed Scheduling Algorithm in a Nuclear Power Plant Monitoring System , 1997, FORTE.
[19] Jianfeng Ma,et al. A delegation based cross trusted domain direct anonymous attestation scheme , 2015, Comput. Networks.