-
1
-
-
0004072686
-
-
Addison-Wesley
-
A. V. Aho, R. Sethi, and J. D. Ullman. Compilers - Principles, Techniques, and Tools. Addison-Wesley, 1986.
-
(1986)
Compilers - Principles, Techniques, and Tools
-
-
Aho, A.V.1
Sethi, R.2
Ullman, J.D.3
-
4
-
-
0003510233
-
-
Technical Report CS-TR-96-1308, University of Wisconsin - Madison, CS Dept., July
-
D. Burger, T. Austin, and S. Bennett. Evaluating future microprocessors: The simplescalar toolset. Technical Report CS-TR-96-1308, University of Wisconsin - Madison, CS Dept., July 1996.
-
(1996)
Evaluating Future Microprocessors: The Simplescalar Toolset
-
-
Burger, D.1
Austin, T.2
Bennett, S.3
-
5
-
-
77954595300
-
-
Available from
-
C-Lab. Wcet benchmarks. Available from http://www.c-lab.de/home/en/ download.html.
-
Wcet Benchmarks.
-
-
-
6
-
-
85009448253
-
Pointguardtm: Protecting pointers from buffer overflow vulnerabilities
-
C. Cowan, S. Beattie, J. Johansen, and P.Wagle. Pointguardtm: protecting pointers from buffer overflow vulnerabilities. In SSYM'03: Proceedings of the 12th conference on USENIX Security Symposium, pages 7-7, 2003.
-
(2003)
SSYM'03: Proceedings of the 12th Conference on USENIX Security Symposium
, pp. 7-7
-
-
Cowan, C.1
Beattie, S.2
Johansen, J.3
Wagle, P.4
-
7
-
-
0032713797
-
Bounding pipeline and instruction cache performance
-
Jan.
-
C. A. Healy, R. D. Arnold, F. Mueller, D. Whalley, and M. G. Harmon. Bounding pipeline and instruction cache performance. IEEE Transactions on Computers, 48(1):53-70, Jan. 1999.
-
(1999)
IEEE Transactions on Computers
, vol.48
, Issue.1
, pp. 53-70
-
-
Healy, C.A.1
Arnold, R.D.2
Mueller, F.3
Whalley, D.4
Harmon, M.G.5
-
9
-
-
33745220279
-
Detection and prevention of stack buffer overflow attacks
-
B. Kuperman, C. Brodley, H. Ozdoganoglu, T. Vijaykumar, and A. Jalote. Detection and prevention of stack buffer overflow attacks. Commun. ACM, 48(11):50-56, 2005.
-
(2005)
Commun. ACM
, vol.48
, Issue.11
, pp. 50-56
-
-
Kuperman, B.1
Brodley, C.2
Ozdoganoglu, H.3
Vijaykumar, T.4
Jalote, A.5
-
12
-
-
3042781457
-
Crossover: Online pests plaguing the offline world
-
E. Levy. Crossover: Online pests plaguing the offline world. IEEE Security and Privacy, 1(6):71-73, 2003.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.6
, pp. 71-73
-
-
Levy, E.1
-
13
-
-
84974687699
-
Scheduling algorithms for multiprogramming in a hard-real-time environment
-
Jan.
-
C. Liu and J. Layland. Scheduling algorithms for multiprogramming in a hard-real-time environment. J. of the Association for Computing Machinery, 20(1):46-61, Jan. 1973.
-
(1973)
J. of the Association for Computing Machinery
, vol.20
, Issue.1
, pp. 46-61
-
-
Liu, C.1
Layland, J.2
-
15
-
-
84879352073
-
Parascale: Expoliting parametric timing analysis for real-time schedulers and dynamic voltage scaling
-
Dec.
-
S. Mohan, F. Mueller, W. Hawkins, M. Root, C. Healy, and D. Whalley. Parascale: Expoliting parametric timing analysis for real-time schedulers and dynamic voltage scaling. In IEEE Real-Time Systems Symposium, pages 233-242, Dec. 2005.
-
(2005)
IEEE Real-Time Systems Symposium
, pp. 233-242
-
-
Mohan, S.1
Mueller, F.2
Hawkins, W.3
Root, M.4
Healy, C.5
Whalley, D.6
-
16
-
-
24944536861
-
Timing analysis for sensor network nodes of the atmega processor family
-
Mar.
-
S. Mohan, F. Mueller, D. Whalley, and C. Healy. Timing analysis for sensor network nodes of the atmega processor family. In IEEE Real-Time Embedded Technology and Applications Symposium, pages 405-414, Mar. 2005.
-
(2005)
IEEE Real-Time Embedded Technology and Applications Symposium
, pp. 405-414
-
-
Mohan, S.1
Mueller, F.2
Whalley, D.3
Healy, C.4
-
18
-
-
0033732401
-
Timing analysis for instruction caches
-
May
-
F. Mueller. Timing analysis for instruction caches. Real-Time Systems, 18(2/3):209-239, May 2000.
-
(2000)
Real-Time Systems
, vol.18
, Issue.2-3
, pp. 209-239
-
-
Mueller, F.1
-
19
-
-
85014332650
-
Security in embedded systems: Design challenges
-
S. Ravi, A. Raghunathan, P. Kocher, and S. Hattangady. Security in embedded systems: Design challenges. ACM Trans. Embed. Comput. Syst., 3(3):461-491, 2004.
-
(2004)
ACM Trans. Embed. Comput. Syst.
, vol.3
, Issue.3
, pp. 461-491
-
-
Ravi, S.1
Raghunathan, A.2
Kocher, P.3
Hattangady, S.4
-
20
-
-
3042738543
-
Swatt: Software-based attestation for embedded devices
-
0
-
A. Seshadri, A. Perrig, L. van Doorn, and P. Khosla. Swatt: Software-based attestation for embedded devices. Security and Privacy, IEEE Symposium on, 0:272, 2004.
-
(2004)
Security and Privacy, IEEE Symposium on
, pp. 272
-
-
Seshadri, A.1
Perrig, A.2
Van Doorn, L.3
Khosla, P.4
-
21
-
-
14844328033
-
On the effectiveness of address-space randomization
-
H. Shacham, M. Page, B. Pfaff, E.-J. Goh-Jin, N. Modadugu, and D. Boneh. On the effectiveness of address-space randomization. In CCS '04: Proceedings of the 11th ACM conference on Computer and communications security, pages 298-307, 2004.
-
(2004)
CCS '04: Proceedings of the 11th ACM Conference on Computer and Communications Security
, pp. 298-307
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh-Jin, E.-J.4
Modadugu, N.5
Boneh, D.6
-
22
-
-
84944726311
-
Defending embedded systems against buffer overflow via hardware/software
-
Washington, DC, USA, IEEE Computer Society
-
Z. Shao, Q. Zhuge, Y. He, and E. H. M. Sha. Defending embedded systems against buffer overflow via hardware/software. In ACSAC '03: Proceedings of the 19th Annual Computer Security Applications Conference, page 352, Washington, DC, USA, 2003. IEEE Computer Society.
-
(2003)
ACSAC '03: Proceedings of the 19th Annual Computer Security Applications Conference
, pp. 352
-
-
Shao, Z.1
Zhuge, Q.2
He, Y.3
Sha, E.H.M.4
-
24
-
-
18844368499
-
Encryption overhead for sensor networks and embedded systems: Modeling and analysis
-
Oct.
-
R. Venugopalan, P. Ganesan, P. Peddabachagari, A. Dean, F. Mueller, and M. Sichitiu. Encryption overhead for sensor networks and embedded systems: Modeling and analysis. In Conference on Compilers, Architecture and Synthesis for Embedded Systems, pages 188-197, Oct. 2003.
-
(2003)
Conference on Compilers, Architecture and Synthesis for Embedded Systems
, pp. 188-197
-
-
Venugopalan, R.1
Ganesan, P.2
Peddabachagari, P.3
Dean, A.4
Mueller, F.5
Sichitiu, M.6
-
25
-
-
0035501757
-
A comparison of static analysis and evolutionary testing for the verification of timing constraints
-
Nov.
-
J. Wegener and F. Mueller. A comparison of static analysis and evolutionary testing for the verification of timing constraints. Real-Time Systems, 21(3):241-268, Nov. 2001.
-
(2001)
Real-Time Systems
, vol.21
, Issue.3
, pp. 241-268
-
-
Wegener, J.1
Mueller, F.2
-
27
-
-
43949126892
-
The worst-case execution time problem - Overview of methods and survey of tools
-
Apr.
-
R. Wilhelm, J. Engblom, A. Ermedahl, N. Holsti, S. Thesing, D. Whalley, G. Bernat, C. Ferdinand, R. Heckmann, T. Mitra, F. Mueller, I. Puaut, P. Puschner, J. Staschulat, and P. Stenstrom. The worst-case execution time problem - overview of methods and survey of tools. ACM Transactions on Embedded Computing Systems, 7(3):1-53, Apr. 2008.
-
(2008)
ACM Transactions on Embedded Computing Systems
, vol.7
, Issue.3
, pp. 1-53
-
-
Wilhelm, R.1
Engblom, J.2
Ermedahl, A.3
Holsti, N.4
Thesing, S.5
Whalley, D.6
Bernat, G.7
Ferdinand, C.8
Heckmann, R.9
Mitra, T.10
Mueller, F.11
Puaut, I.12
Puschner, P.13
Staschulat, J.14
Stenstrom, P.15
-
28
-
-
85029731561
-
A survey of attacks and countermeasures in mobile ad hoc networks
-
B. Wu, J. Chen, J. Wu, and M. Cardei. A survey of attacks and countermeasures in mobile ad hoc networks. Wireless Network Security, 30(3):103-135, 2007.
-
(2007)
Wireless Network Security
, vol.30
, Issue.3
, pp. 103-135
-
-
Wu, B.1
Chen, J.2
Wu, J.3
Cardei, M.4
-
29
-
-
33750954792
-
Open issues and challenges in security-aware real-time scheduling for distributed systems
-
T. Xie, X. Qin, and M. Lin. Open issues and challenges in security-aware real-time scheduling for distributed systems. Journal of Information, 6(9), 2006.
-
(2006)
Journal of Information
, vol.6
, pp. 9
-
-
Xie, T.1
Qin, X.2
Lin, M.3
-
32
-
-
0041473688
-
Intrusion detection techniques for mobile wireless networks
-
Y. Zhang, W. Lee, and Y.-A. Huang. Intrusion detection techniques for mobile wireless networks. Wireless Networking, 9(5):545-556, 2003.
-
(2003)
Wireless Networking
, vol.9
, Issue.5
, pp. 545-556
-
-
Zhang, Y.1
Lee, W.2
Huang, Y.-A.3
|