-
1
-
-
84890803091
-
-
AMD website
-
AMD website. www.amd.com.
-
-
-
-
3
-
-
33846644420
-
Hardware-assisted run-time monitoring for secure program execution on embedded processors
-
D. Arora, S. Ravi, A. Raghunathan, and N. K. Jha. Hardware-assisted run-time monitoring for secure program execution on embedded processors. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 14(12): 1295-1308, 2006.
-
(2006)
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
, vol.14
, Issue.12
, pp. 1295-1308
-
-
Arora, D.1
Ravi, S.2
Raghunathan, A.3
Jha, N.K.4
-
4
-
-
84890796964
-
-
BACnet - a data communication protocol for building automation and control networks. ANSI/ASHRAE 135, 2004.
-
BACnet - a data communication protocol for building automation and control networks. ANSI/ASHRAE 135, 2004.
-
-
-
-
5
-
-
35248822611
-
Oblivious hashing: A stealthy software integrity verification primitive
-
London, UK, Springer-Verlag
-
Y. Chen, R. Venkatesan, M. Cary, R. Pang, S. Sinha, and M. H. Jakubowski. Oblivious hashing: A stealthy software integrity verification primitive. In IH'02: Revised Papers from the 5th International Workshop on Information Hiding, pages 400-414, London, UK, 2003. Springer-Verlag.
-
(2003)
IH'02: Revised Papers from the 5th International Workshop on Information Hiding
, pp. 400-414
-
-
Chen, Y.1
Venkatesan, R.2
Cary, M.3
Pang, R.4
Sinha, S.5
Jakubowski, M.H.6
-
7
-
-
85084160243
-
Stack-Guard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
San Antonio, Texas, jan
-
C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, Q. Zhang, and H. Hinton. Stack-Guard: Automatic adaptive detection and prevention of buffer-overflow attacks. In Proc. 7th USENIX Security Conference, pages 63-78, San Antonio, Texas, jan 1998.
-
(1998)
Proc. 7th USENIX Security Conference
, pp. 63-78
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Walpole, J.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
Hinton, H.10
-
8
-
-
21644440888
-
Security for industrial communication systems
-
D. Dzung, M. Naedele, T. Von Hoff, and M. Crevatin. Security for industrial communication systems. Proceedings of the IEEE, 93(6): 1152-1177, 2005.
-
(2005)
Proceedings of the IEEE
, vol.93
, Issue.6
, pp. 1152-1177
-
-
Dzung, D.1
Naedele, M.2
Von Hoff, T.3
Crevatin, M.4
-
9
-
-
41549140993
-
Security in Networked Building Automation Systems
-
June
-
W. Granzer, W. Kastner, G. Neugschwandtner, and F. Praus. Security in Networked Building Automation Systems. In Proc. 6th IEEE International Workshop on Factory Communication Systems (WFCS'06), pages 283-292, June 2006.
-
(2006)
Proc. 6th IEEE International Workshop on Factory Communication Systems (WFCS'06)
, pp. 283-292
-
-
Granzer, W.1
Kastner, W.2
Neugschwandtner, G.3
Praus, F.4
-
10
-
-
34547442399
-
-
L. Gu and J. A. Stankovic. t-kernel: providing reliable os support to wireless sensor networks. In SenSys'06: Proceedings of the 4th international conference on Embedded networked sensor systems, pages 1-14, New York, NY, USA, 2006. ACM.
-
L. Gu and J. A. Stankovic. t-kernel: providing reliable os support to wireless sensor networks. In SenSys'06: Proceedings of the 4th international conference on Embedded networked sensor systems, pages 1-14, New York, NY, USA, 2006. ACM.
-
-
-
-
11
-
-
38749115957
-
Towards scalable and secure execution platform for embedded systems
-
Washington, DC, USA, IEEE Computer Society
-
I. Hiroaki, M. Edahiro, and J. Sakai. Towards scalable and secure execution platform for embedded systems. In ASP-DAC'07: Proceedings of the 2007 conference on Asia South Pacific design automation, pages 350-354, Washington, DC, USA, 2007. IEEE Computer Society.
-
(2007)
ASP-DAC'07: Proceedings of the 2007 conference on Asia South Pacific design automation
, pp. 350-354
-
-
Hiroaki, I.1
Edahiro, M.2
Sakai, J.3
-
13
-
-
56349157302
-
-
KNX specification
-
KNX specification. Konnex Association, 2004.
-
(2004)
Konnex Association
-
-
-
15
-
-
33745479804
-
Theoretical basis for intrusion detection
-
West Point, NY, USA, June, IEEE SMC Society
-
Z. Li, A. Das, and J. Zhou. Theoretical basis for intrusion detection. In Proceedings of 6th IEEE Information Assurance Workshop (IAW), West Point, NY, USA, June 2005. IEEE SMC Society.
-
(2005)
Proceedings of 6th IEEE Information Assurance Workshop (IAW)
-
-
Li, Z.1
Das, A.2
Zhou, J.3
-
16
-
-
84890790215
-
-
Control network protocol specification. ANSI/EIA/CEA 709.1, 1999.
-
Control network protocol specification. ANSI/EIA/CEA 709.1, 1999.
-
-
-
-
17
-
-
0001800257
-
Safe, untrusted agents using proof-carrying code
-
London, UK, Springer-Verlag
-
G. C. Necula and P. Lee. Safe, untrusted agents using proof-carrying code. In Mobile Agents and Security, pages 61-91, London, UK, 1998. Springer-Verlag.
-
(1998)
Mobile Agents and Security
, pp. 61-91
-
-
Necula, G.C.1
Lee, P.2
-
18
-
-
85014332650
-
Security in embedded systems: Design challenges
-
461-491
-
S. Ravi, A. Raghunathan, P. Kocher, and S. Hattangady. Security in embedded systems: Design challenges. Trans. on Embedded Computing Sys., 3(3):461-491, 2004.
-
(2004)
Trans. on Embedded Computing Sys
, vol.3
, Issue.3
-
-
Ravi, S.1
Raghunathan, A.2
Kocher, P.3
Hattangady, S.4
-
19
-
-
36049009786
-
An architectural approach to preventing code injection attacks
-
Washington, DC, USA, IEEE Computer Society
-
R. Riley, X. Jiang, and D. Xu. An architectural approach to preventing code injection attacks. In DSN'07: Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, pages 30-40, Washington, DC, USA, 2007. IEEE Computer Society.
-
(2007)
DSN'07: Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks
, pp. 30-40
-
-
Riley, R.1
Jiang, X.2
Xu, D.3
|