메뉴 건너뛰기




Volumn 5789 LNCS, Issue , 2009, Pages 655-670

Cumulative attestation kernels for embedded systems

Author keywords

[No Author keywords available]

Indexed keywords

BATTERY BACKUP; CORE TECHNOLOGY; EMBEDDED PROCESSORS; MALWARES; NETWORKED EMBEDDED SYSTEMS; POWER EFFICIENCY; REMOTE ATTESTATION; SMART POWER GRID; TRUSTED PLATFORM MODULE;

EID: 70350381132     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-04444-1_40     Document Type: Conference Paper
Times cited : (35)

References (24)
  • 1
    • 70350431459 scopus 로고    scopus 로고
    • Southern california edison achieves key advanced metering goal. Electric Energy Online (August 2, 2007), http://electricenergyonline.com/IndustryNews. asp?m=1\&id=71649
    • Southern california edison achieves key advanced metering goal. Electric Energy Online (August 2, 2007), http://electricenergyonline.com/IndustryNews. asp?m=1\&id=71649
  • 2
    • 70350409829 scopus 로고    scopus 로고
    • TCG specification architecture overview. Trusted Computing Group (August 2, 2007), http://www.trustedcomputinggroup.org/developers/trusted platform module/specifications
    • TCG specification architecture overview. Trusted Computing Group (August 2, 2007), http://www.trustedcomputinggroup.org/developers/trusted platform module/specifications
  • 3
    • 84957018842 scopus 로고    scopus 로고
    • Low cost attacks on tamper resistant devices
    • Christianson, B, Lomas, M, eds, Security Protocols 1997, Springer, Heidelberg
    • Anderson, R.J., Kuhn, M.: Low cost attacks on tamper resistant devices. In: Christianson, B., Lomas, M. (eds.) Security Protocols 1997. LNCS, vol. 1361, pp. 125-136. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1361 , pp. 125-136
    • Anderson, R.J.1    Kuhn, M.2
  • 12
    • 35248862449 scopus 로고    scopus 로고
    • Electromagnetic analysis: Concrete results
    • Gandolfi, K., Mourtel, C., Olivier, F.: Electromagnetic analysis: Concrete results. LNCS, pp. 251-261 (2001)
    • (2001) LNCS , pp. 251-261
    • Gandolfi, K.1    Mourtel, C.2    Olivier, F.3
  • 14
    • 33747255010 scopus 로고    scopus 로고
    • Applying protocol analysis to security device interfaces
    • Herzog, J.: Applying protocol analysis to security device interfaces. IEEE Security and Privacy 4(4), 84-87 (2006)
    • (2006) IEEE Security and Privacy , vol.4 , Issue.4 , pp. 84-87
    • Herzog, J.1
  • 20
    • 85084162270 scopus 로고    scopus 로고
    • Sailer, R., Zhang, X., Jaeger, T., Doorn, L.v.: Design and implementation of a TCG-based integrity measurement architecture. In: Proceedings of the 13th USENIX Security Symposium, August 2004, pp. 233-238. USENIX Association (2004)
    • Sailer, R., Zhang, X., Jaeger, T., Doorn, L.v.: Design and implementation of a TCG-based integrity measurement architecture. In: Proceedings of the 13th USENIX Security Symposium, August 2004, pp. 233-238. USENIX Association (2004)
  • 24
    • 70349253246 scopus 로고    scopus 로고
    • Trusted Computing building blocks for embedded Linux-based ARM TrustZone platforms
    • ACM Press, New York
    • Winter, J.: Trusted Computing building blocks for embedded Linux-based ARM TrustZone platforms. In: Proceedings of the 2008 ACM Workshop on Scalable Trusted Computing. ACM Press, New York (2008)
    • (2008) Proceedings of the 2008 ACM Workshop on Scalable Trusted Computing
    • Winter, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.