-
2
-
-
84887352919
-
-
Year 2000 problem, http://en.wikipedia.org/wiki/Year-2000-problem.
-
Year 2000 Problem
-
-
-
6
-
-
70449498311
-
-
Trusted Boot, http://sourceforge.net/projects/tboot.
-
Trusted Boot
-
-
-
7
-
-
74049112175
-
On the difficulty of software-based attestation of embedded devices
-
C. Castelluccia, A. Francillon, D. Perito, and C. Soriente. On the difficulty of software-based attestation of embedded devices. In Proceedings of the 16th ACM conference on Computer and communications security, pages 400-409, 2009.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 400-409
-
-
Castelluccia, C.1
Francillon, A.2
Perito, D.3
Soriente, C.4
-
11
-
-
77957778583
-
How low can you go?: Recommendations for hardware-supported minimal TCB code execution
-
DOI 10.1145/1346281.1346285, ASPLOS XIII - Thirteenth International Conference on Architectural Support for Programming Languages and Operating Systems
-
J. M. McCune, B. Parno, A. Perrig, M. K. Reiter, and A. Seshadri. How low can you go?: recommendations for hardware-supported minimal tcb code execution. In Proceedings of the 13th international conference on Architectural support for programming languages and operating systems, pages 14-25, 2008. (Pubitemid 351585390)
-
(2008)
International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS
, pp. 14-25
-
-
McCune, J.M.1
Parno, B.2
Perrig, A.3
Reiter, M.K.4
Seshadri, A.5
-
14
-
-
34247361254
-
SCUBA: Secure Code Update by Attestation in sensor networks
-
DOI 10.1145/1161289.1161306, WiSE 2006 - Proceedings of the 5th ACM Workshop on Wireless Security
-
A. Seshadri, M. Luk, A. Perrig, L. van Doorn, and P. Khosla. Scuba: Secure code update by attestation in sensor networks. In Proceedings of the 5th ACM workshop on Wireless security, pages 85-94, 2006. (Pubitemid 46634305)
-
(2006)
WiSE 2006 - Proceedings of the 5th ACM Workshop on Wireless Security
, vol.2006
, pp. 85-94
-
-
Seshadri, A.1
Luk, M.2
Perrig, A.3
Van Doorn, L.4
Khosla, P.5
-
15
-
-
33845427178
-
Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems
-
DOI 10.1145/1095809.1095812
-
A. Seshadri, M. Luk, E. Shi, A. Perrig, L. van Doorn, and P. Khosla. Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems. In Proceedings of the twentieth ACM symposium on Operating systems principles, pages 1-16, 2005. (Pubitemid 44892201)
-
(2005)
Operating Systems Review (ACM)
, vol.39
, Issue.5
, pp. 1-16
-
-
Seshadri, A.1
Perrig, A.2
Luk, M.3
Van Doom, L.4
Shi, E.5
Khosla, P.6
-
16
-
-
3042738543
-
Swatt: Software-based attestation for embedded devices
-
A. Seshadri, A. Perrig, L. van Doorn, and P. K. Khosla. Swatt: Software-based attestation for embedded devices. In IEEE Symposium on Security and Privacy, pages 272-282, 2004.
-
(2004)
IEEE Symposium on Security and Privacy
, pp. 272-282
-
-
Seshadri, A.1
Perrig, A.2
Doorn, L.V.3
Khosla, P.K.4
-
17
-
-
33745736071
-
Remote software-based attestation for wireless sensors
-
DOI 10.1007/11601494-3, Security and Privacy in Ad-hoc and Sensor Networks - Second European Workshop, ESAS 2005, Revised Selected Papers
-
M. Shaneck, K. Mahadevan, V. Kher, and Y. Kim. Remote software-based attestation for wireless sensors. In Security and Privacy in Ad-hoc and Sensor Networks, pages 27-41, 2005. (Pubitemid 44012971)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3813
, pp. 27-41
-
-
Shaneck, M.1
Mahadevan, K.2
Kher, V.3
Kim, Y.4
-
19
-
-
77954322038
-
Attacking intel trusted execution technology
-
R. Wojtczuk and J. Rutkowska. Attacking intel trusted execution technology. In Black Hat DC, 2009.
-
(2009)
Black Hat DC
-
-
Wojtczuk, R.1
Rutkowska, J.2
-
21
-
-
47249110641
-
Distributed software-based attestation for node compromise detection in sensor networks
-
Y. Yang, X. Wang, S. Zhu, and G. Cao. Distributed software-based attestation for node compromise detection in sensor networks. In Proceedings of the 26th IEEE International Symposium on Reliable Distributed Systems, pages 219-230, 2007.
-
(2007)
Proceedings of the 26th IEEE International Symposium on Reliable Distributed Systems
, pp. 219-230
-
-
Yang, Y.1
Wang, X.2
Zhu, S.3
Cao, G.4
|