-
1
-
-
56449088327
-
Creating a Secure Infrastructurefor Wireless Diagnostics and Software Updates in Vehicles
-
Springer
-
D. K. Nilsson, U. E. Larson, and E. Jonsson, "Creating a Secure Infrastructurefor Wireless Diagnostics and Software Updates in Vehicles," in Proceedings of the 27th International Conference on Computer Safety, Reliability and Security (SAFECOMP). Springer, 2008, pp. 207-220.
-
(2008)
Proceedings of the 27th International Conference on Computer Safety, Reliability and Security (SAFECOMP)
, pp. 207-220
-
-
Nilsson, D.K.1
Larson, U.E.2
Jonsson, E.3
-
2
-
-
33745951661
-
Secure Software Upload in an Intelligent Vehicle via Wireless Communication Links
-
IEEE
-
S. M. Mahmud, S. Shanker, and I. Hossain, "Secure Software Upload in an Intelligent Vehicle via Wireless Communication Links," in Proceedings of IEEE Intelligent Vehicles Symposium. IEEE, 2005, pp. 587-592.
-
(2005)
Proceedings of IEEE Intelligent Vehicles Symposium
, pp. 587-592
-
-
Mahmud, S.M.1
Shanker, S.2
Hossain, I.3
-
5
-
-
58149134776
-
A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay
-
Springer
-
D. K. Nilsson, U. E. Larson, F. Picasso, and E. Jonsson, "A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay," in Proceedings of the First International Workshop on Computational Intelligence in Security for Information Systems (CISIS). Springer, 2008.
-
(2008)
Proceedings of the First International Workshop on Computational Intelligence in Security for Information Systems (CISIS)
-
-
Nilsson, D.K.1
Larson, U.E.2
Picasso, F.3
Jonsson, E.4
-
7
-
-
62949168349
-
L4cars
-
Cologne, Germany
-
K. Elphinstone, G. Heiser, R. Huuck, S. M. Petters, and S. Ruocco, "L4cars," in Embedded Security in Cars (ESCAR), Cologne, Germany,2005.
-
(2005)
Embedded Security in Cars (ESCAR)
-
-
Elphinstone, K.1
Heiser, G.2
Huuck, R.3
Petters, S.M.4
Ruocco, S.5
-
8
-
-
3042738543
-
SWATT: SoftWare-based ATTestation for Embedded Devices
-
IEEE Computer Society
-
A. Seshadri, A. Perrig, L. van Doorn, and P. K. Khosla, "SWATT: SoftWare-based ATTestation for Embedded Devices," in IEEE Symposium on Security and Privacy. IEEE Computer Society, 2004.
-
(2004)
IEEE Symposium on Security and Privacy
-
-
Seshadri, A.1
Perrig, A.2
van Doorn, L.3
Khosla, P.K.4
-
9
-
-
58349102376
-
Using Softwarebased Attestation for Verifying Embedded Systems in Cars
-
A. Seshadri, A. Perrig, L. van Doorn, and P. Khosla, "Using Softwarebased Attestation for Verifying Embedded Systems in Cars," in Embedded Security in Cars (ESCAR), 2004.
-
(2004)
Embedded Security in Cars (ESCAR)
-
-
Seshadri, A.1
Perrig, A.2
van Doorn, L.3
Khosla, P.4
-
10
-
-
84885617227
-
Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems
-
NewYork,NY, USA: ACM Press, December
-
A. Seshadri, M. Luk, E. Shi, A. Perrig, L. van Doorn, and P. Khosla, "Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems," in SOSP'05: Proceedings of the twentieth ACM symposium on Operating systems principles. NewYork,NY, USA: ACM Press, December 2005, pp. 1-16.
-
(2005)
SOSP'05: Proceedings of the twentieth ACM symposium on Operating systems principles
, pp. 1-16
-
-
Seshadri, A.1
Luk, M.2
Shi, E.3
Perrig, A.4
van Doorn, L.5
Khosla, P.6
-
11
-
-
34247361254
-
SCUBA: Secure code update by attestation in sensor networks
-
September
-
A. Seshadri, M. Luk, A. Perrig, L. van Doorn, and P. Khosla, "SCUBA: Secure code update by attestation in sensor networks," in ACM Workshop on Wireless Security (WiSe), September 2006.
-
(2006)
ACM Workshop on Wireless Security (WiSe)
-
-
Seshadri, A.1
Luk, M.2
Perrig, A.3
van Doorn, L.4
Khosla, P.5
-
12
-
-
27544477855
-
BIND: A fine-grained attestation service for secure distributed systems
-
Washington, DC, USA: IEEE Computer Society
-
E. Shi, A. Perrig, and L. Van Doorn, "BIND: A fine-grained attestation service for secure distributed systems," in SP'05: Proceedings of the 2005 IEEE Symposium on Security and Privacy. Washington, DC, USA: IEEE Computer Society, 2005, pp. 154-168.
-
(2005)
SP'05: Proceedings of the 2005 IEEE Symposium on Security and Privacy
, pp. 154-168
-
-
Shi, E.1
Perrig, A.2
Van Doorn, L.3
-
13
-
-
62949239225
-
Certifying Program Execution with Secure Processors
-
Berkeley, CA, USA
-
B. Chen and R. Morris, "Certifying Program Execution with Secure Processors," in HOTOS'03: Proceedings of the 9th Conference on Hot Topics in Operating Systems, Berkeley, CA, USA, 2003, p. 23.
-
(2003)
HOTOS'03: Proceedings of the 9th Conference on Hot Topics in Operating Systems
, pp. 23
-
-
Chen, B.1
Morris, R.2
-
14
-
-
85028170979
-
Establishing the Genuinity of Remote Computer Systems
-
Berkeley, CA, USA: USENIX Association
-
R. Kennell and L. H. Jamieson, "Establishing the Genuinity of Remote Computer Systems," in SSYM'03: Proceedings of the 12th conference on USENIX Security Symposium. Berkeley, CA, USA: USENIX Association, 2003, pp. 295-310.
-
(2003)
SSYM'03: Proceedings of the 12th conference on USENIX Security Symposium
, pp. 295-310
-
-
Kennell, R.1
Jamieson, L.H.2
-
15
-
-
19944369062
-
Soft Tamper-Proofing via Program Integrity Verification in Wireless Sensor Networks
-
T. Park and K. G. Shin, "Soft Tamper-Proofing via Program Integrity Verification in Wireless Sensor Networks," Mobile Computing, IEEE Transactions on, vol. 4, no. 3, pp. 297-309, 2005.
-
(2005)
Mobile Computing, IEEE Transactions on
, vol.4
, Issue.3
, pp. 297-309
-
-
Park, T.1
Shin, K.G.2
-
16
-
-
39149110948
-
Remote Attestation on Legacy Operating Systems With Trusted Platform Modules
-
February
-
D. Schellekens, B. Wyseur, and B. Preneel, "Remote Attestation on Legacy Operating Systems With Trusted Platform Modules," Electron. Notes Theor. Comput. Sci., vol. 197, no. 1, pp. 59-72, February 2008.
-
(2008)
Electron. Notes Theor. Comput. Sci
, vol.197
, Issue.1
, pp. 59-72
-
-
Schellekens, D.1
Wyseur, B.2
Preneel, B.3
-
17
-
-
34047170729
-
Software Integrity Protection Using Timed Executable Agents
-
New York, NY, USA: ACM
-
J. A. Garay and L. Huelsbergen, "Software Integrity Protection Using Timed Executable Agents," in ASIACCS'06: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security. New York, NY, USA: ACM, 2006, pp. 189-200.
-
(2006)
ASIACCS'06: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security
, pp. 189-200
-
-
Garay, J.A.1
Huelsbergen, L.2
-
19
-
-
62949238401
-
-
ARM and Intel, ARM Security Solutions and Intel Authenticated Flash, White Paper, http://www.arm.com/pdfs/Intel ARM Security WhitePaper.pdf, 2007.
-
ARM and Intel, "ARM Security Solutions and Intel Authenticated Flash, White Paper," http://www.arm.com/pdfs/Intel ARM Security WhitePaper.pdf, 2007.
-
-
-
-
20
-
-
21644433634
-
Xen and the Art of Virtualization
-
SystemsPrinciples SOSP
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield, "Xen and the Art of Virtualization," in Proceedings of the Nineteenth ACM Symposium on Operating SystemsPrinciples (SOSP), 2003, pp. 164-177.
-
(2003)
Proceedings of the Nineteenth ACM Symposium on Operating
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
21
-
-
21644455412
-
Terra: A Virtual Machine-Based Platform for Trusted Computing, SIGOPSOper
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh, "Terra: A Virtual Machine-Based Platform for Trusted Computing," SIGOPSOper. Syst. Rev., vol. 37, no. 5, pp. 193-206, 2003.
-
(2003)
Syst. Rev
, vol.37
, Issue.5
, pp. 193-206
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
22
-
-
51949117926
-
A Multi-Layer Mandatory Access Control Mechanism for Mobile Devices Based on Virtualization
-
S.-M. Lee, S.-B. Suh, B. Jeong, and S. Mo, "A Multi-Layer Mandatory Access Control Mechanism for Mobile Devices Based on Virtualization," in Consumer Communications and Networking Conference, 2008. CCNC 2008. 5th IEEE, 2008, pp. 251-256.
-
(2008)
Consumer Communications and Networking Conference, 2008. CCNC 2008. 5th IEEE
, pp. 251-256
-
-
Lee, S.-M.1
Suh, S.-B.2
Jeong, B.3
Mo, S.4
-
23
-
-
53549132551
-
A Lightweight Kernel Objects Monitoring Infrastructure for Embedded Systems
-
Kaohsiung, Taiwan, August
-
L. Sun and T. Nakajima, "A Lightweight Kernel Objects Monitoring Infrastructure for Embedded Systems," in The 14th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA), Kaohsiung, Taiwan, August 2008, pp. 55-60.
-
(2008)
The 14th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA)
, pp. 55-60
-
-
Sun, L.1
Nakajima, T.2
-
24
-
-
33646895419
-
Can We Make Operating Systems Reliable and Secure?
-
May
-
A. S. Tanenbaum, J. N. Herder, and H. Bos, "Can We Make Operating Systems Reliable and Secure?" Computer, vol. 39, no. 5, pp. 44-51, May 2006.
-
(2006)
Computer
, vol.39
, Issue.5
, pp. 44-51
-
-
Tanenbaum, A.S.1
Herder, J.N.2
Bos, H.3
-
25
-
-
63149091165
-
SPUMONE: LightWeight CPU Virtualization Layer for Embedded Systems
-
W. Kanda, Y. Kinebuchi, Y. Yumura, and T. Nakajima, "SPUMONE: LightWeight CPU Virtualization Layer for Embedded Systems," in Proceedings of the 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC), 2008.
-
(2008)
Proceedings of the 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC)
-
-
Kanda, W.1
Kinebuchi, Y.2
Yumura, Y.3
Nakajima, T.4
-
26
-
-
62949111313
-
SH7780 SuperH RISC Engine Family
-
series landing.jsp&fp=/products/mpumcu/ superh family/sh7780 series
-
"SH7780 SuperH RISC Engine Family," http://america.renesas. com/fmwk.jsp?cnt=sh7780 series landing.jsp&fp=/products/mpumcu/ superh family/sh7780 series/.
-
-
-
-
27
-
-
24344490175
-
A Generic Attack on Checksumming-Based Software Tamper Resistance
-
G. Wurster, P. C. van Oorschot, and A. Somayaji, "A Generic Attack on Checksumming-Based Software Tamper Resistance," in Security and Privacy, 2005 IEEE Symposium on, 2005, pp. 127-138.
-
(2005)
Security and Privacy, 2005 IEEE Symposium on
, pp. 127-138
-
-
Wurster, G.1
van Oorschot, P.C.2
Somayaji, A.3
|