Hardware and embedded security in the context of internet of things
暂无分享,去创建一个
Ramesh Karri | Sateesh Addepalli | Arun K. Kanuparthi | S. Addepalli | R. Karri | A. Kanuparthi | Sateesh Addepalli
[1] A. One,et al. Smashing The Stack For Fun And Profit , 1996 .
[2] Deian Stefan,et al. Data-Provenance Verification For Secure Hosts , 2012, IEEE Transactions on Dependable and Secure Computing.
[3] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[4] Jonathan M. Smith,et al. Eros: a capability system , 1999 .
[5] Ramesh Karri,et al. Sensor physical unclonable functions , 2010, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[6] Ramjee Prasad,et al. Proposed embedded security framework for Internet of Things (IoT) , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).
[7] G. Edward Suh,et al. Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.
[8] Rodrigo Roman,et al. Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..
[9] Ruby B. Lee,et al. Scalable architectural support for trusted software , 2010, HPCA - 16 2010 The Sixteenth International Symposium on High-Performance Computer Architecture.
[10] R. Sunitha,et al. DATA-PROVENANCE VERIFICATION FOR SECURE HOSTS , 2013 .
[11] Felix Wortmann,et al. Internet of Things , 2015, Business & Information Systems Engineering.
[12] Ramesh Karri,et al. NumChecker: Detecting kernel control-flow modifying rootkits by using Hardware Performance Counters , 2013, 2013 50th ACM/EDAC/IEEE Design Automation Conference (DAC).
[13] Dave Evans,et al. How the Next Evolution of the Internet Is Changing Everything , 2011 .