메뉴 건너뛰기




Volumn 2, Issue , 2009, Pages 830-836

Hardware containers for software components: A trusted platform for COTS-based systems

Author keywords

[No Author keywords available]

Indexed keywords

COMMERCIAL OFF-THE-SHELF COMPONENTS; COMPILE TIME; COTS-BASED SYSTEMS; DENIAL OF SERVICE; EXECUTION TIME; FURTHER DEVELOPMENT; GLUE-CODES; HARDWARE SUPPORTS; MEMORY ACCESS; PLUG-INS; RECOVERY PROCEDURE; SOFTWARE COMPONENT; SOFTWARE DEVELOPMENT; SYSTEM RESOURCES; THIRD PARTIES;

EID: 70749140736     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSE.2009.56     Document Type: Conference Paper
Times cited : (4)

References (36)
  • 2
    • 34249779582 scopus 로고    scopus 로고
    • Architectural support for run-time validation of program data properties
    • May
    • D. Arora, S. Ravi, A. Raghunathan, N. Jha. Architectural Support for Run-Time Validation of Program Data Properties. IEEE Trans. VLSI systems, Vol. 15, No. 5, May, 2007.
    • (2007) IEEE Trans. VLSI Systems , vol.15 , Issue.5
    • Arora, D.1    Ravi, S.2    Raghunathan, A.3    Jha, N.4
  • 4
    • 0035339048 scopus 로고    scopus 로고
    • COTS-Based systems top 10 list
    • V. Basili and B. Boehm. COTS-Based systems top 10 list. IEEE Computer, Vol.34, No.5, pp.91-95, 2001.
    • (2001) IEEE Computer , vol.34 , Issue.5 , pp. 91-95
    • Basili, V.1    Boehm, B.2
  • 9
    • 84869663596 scopus 로고    scopus 로고
    • CERT sb04-357. Available at Dec.
    • CERT. US-CERT cyber security bulletin sb04-357. Available at http://www.uscert.gov/cas/bulletins/SB04-357.html, Dec. 2004.
    • (2004) US-CERT Cyber Security Bulletin
  • 11
    • 65749098082 scopus 로고    scopus 로고
    • Embedded software: Facts, figures, and future
    • April
    • C. Ebert and C. Jones. Embedded Software: Facts, Figures, and Future, Computer, vol. 42, no. 4, pp. 42-52, April, 2009.
    • (2009) Computer , vol.42 , Issue.4 , pp. 42-52
    • Ebert, C.1    Jones, C.2
  • 15
    • 70749136163 scopus 로고    scopus 로고
    • Solaris containers: A breakthrough approach to virtualization
    • February
    • C. Mackinnon. Solaris Containers: A Breakthrough Approach to Virtualization. Processor Magazine, Vol. 28, No. 8, p. 33, February 2006.
    • (2006) Processor Magazine , vol.28 , Issue.8 , pp. 33
    • Mackinnon, C.1
  • 19
    • 84871961892 scopus 로고    scopus 로고
    • reference IDs 38527 (Apple iTouch / iPhone TIFF Image Handling Privilege Escalation) and 19665 (Sony PSP Photo Viewer TIFF File Overflow)
    • Open-source Vulnerability Database (OSVDB), reference IDs 38527 (Apple iTouch / iPhone TIFF Image Handling Privilege Escalation) and 19665 (Sony PSP Photo Viewer TIFF File Overflow).
    • Open-source Vulnerability Database (OSVDB)
  • 21
    • 33748501504 scopus 로고    scopus 로고
    • Smashguard: A hardware solution to prevent security attacks on the function return address
    • October
    • H. Ozdoganoglu, T. Vijaykumar, C. Brodley, B. Kuperman, and A. Jalote. Smashguard: A Hardware Solution to Prevent Security Attacks on the Function Return Address. IEEE Transactions on Computers, Vol. 55, No. 10, pp. 1271-1281, October 2006.
    • (2006) IEEE Transactions on Computers , vol.55 , Issue.10 , pp. 1271-1281
    • Ozdoganoglu, H.1    Vijaykumar, T.2    Brodley, C.3    Kuperman, B.4    Jalote, A.5
  • 22
    • 33644661238 scopus 로고    scopus 로고
    • Content-addressable memory (CAM) circuits and architectures: A tutorial and survey
    • K. Pagiamtzis and A. Sheikholesami. Content-addressable memory (CAM) circuits and architectures: a tutorial and survey, IEEE J. Solid-State Circuits, pp. 712-727, 2006.
    • (2006) IEEE J. Solid-State Circuits , pp. 712-727
    • Pagiamtzis, K.1    Sheikholesami, A.2
  • 24
    • 84869676691 scopus 로고    scopus 로고
    • The Richards Benchmark.http://research.sun.com/people/mario/java- benchmarking/.
    • The Richards Benchmark
  • 29
    • 84869689506 scopus 로고    scopus 로고
    • Trusted Computing Group.
    • Trusted Computing Group. http://www.trustedcomputing.org.
  • 31
    • 0242671076 scopus 로고    scopus 로고
    • Janus: An approach for confinement of untrusted applications
    • UC Berkeley
    • D. Wagner. Janus: An Approach for Confinement of Untrusted Applications. Technical Report CSD-99-1056, UC Berkeley, 1999.
    • (1999) Technical Report CSD-99-1056
    • Wagner, D.1
  • 32
    • 84948590819 scopus 로고
    • Security and privacy in computer systems
    • W.H. Ware. Security and Privacy in Computer Systems, Proc. Spring Joint Computer Conf., Vol. 30, pp.287-290, 1967.
    • (1967) Proc. Spring Joint Computer Conf. , vol.30 , pp. 287-290
    • Ware, W.H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.