메뉴 건너뛰기




Volumn 50 LNICST, Issue , 2010, Pages 344-361

Efficient isolation of trusted subsystems in embedded systems

Author keywords

Isolation; Memory protection; Software security

Indexed keywords

CODE SHARING; COMPUTING PLATFORM; CONFIDENTIAL DATA; CRYPTOGRAPHIC KEY; EFFICIENT IMPLEMENTATION; HARDWARE FEATURES; HARDWARE MECHANISM; HARDWARE SUPPORTS; ISOLATION; MEMORY PROTECTION; MEMORY SPACE; PAYMENT TERMINAL; SECURE ELECTRONIC TRANSACTION; SECURITY REQUIREMENTS; SENSITIVE DATAS; SOFTWARE IMPLEMENTATION; SOFTWARE SECURITY; VIRTUAL MACHINE MONITORS; VIRTUAL MEMORY;

EID: 84863437524     PISSN: 18678211     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-16161-2_20     Document Type: Conference Paper
Times cited : (64)

References (19)
  • 1
    • 84885885930 scopus 로고    scopus 로고
    • Trusted Computing Group: Tpm main specification, http://www. trustedcomputinggroup.org/
  • 3
    • 0033293553 scopus 로고    scopus 로고
    • Building a high-performance, programmable secure coprocessor
    • Smith, S., Weingart, S.: Building a high-performance, programmable secure coprocessor. Comput. Networks 31(8), 831-860 (1999)
    • (1999) Comput. Networks , vol.31 , Issue.8 , pp. 831-860
    • Smith, S.1    Weingart, S.2
  • 4
    • 85092890026 scopus 로고    scopus 로고
    • Certifying program execution with secure processors
    • Chen, B., Morris, R.: Certifying program execution with secure processors. In: USENIX HotOS Workshop, pp. 133-138 (2003)
    • (2003) USENIX HotOS Workshop , pp. 133-138
    • Chen, B.1    Morris, R.2
  • 6
    • 85077706009 scopus 로고    scopus 로고
    • OSLO: Improving the security of trusted computing
    • USENIX Association
    • Kauer, B.: OSLO: improving the security of trusted computing. In: Proceedings of 16th USENIX Security Symposium, pp. 1-9. USENIX Association (2007)
    • (2007) Proceedings of 16th USENIX Security Symposium , pp. 1-9
    • Kauer, B.1
  • 9
    • 84885887315 scopus 로고    scopus 로고
    • Aleph1: Smashing the stack for fun and profit
    • Aleph1: Smashing the stack for fun and profit. Phrack 49 (1996)
    • (1996) Phrack , vol.49
  • 10
  • 12
    • 0026837069 scopus 로고
    • An automatic search for security flaws in key management schemes
    • Longley, D., Rigby, S.: An automatic search for security flaws in key management schemes. Computers & Security 11(1), 75-89 (1992)
    • (1992) Computers & Security , vol.11 , Issue.1 , pp. 75-89
    • Longley, D.1    Rigby, S.2
  • 14
    • 38049035512 scopus 로고    scopus 로고
    • Low-level software security: Attacks and defenses
    • Aldini, A., Gorrieri, R. (eds.) LNCS Springer, Heidelberg
    • Erlingsson, Ú.: Low-level software security: Attacks and defenses. In: Aldini, A., Gorrieri, R. (eds.) FOSAD 2007. LNCS, vol. 4677, pp. 92-134. Springer, Heidelberg (2007)
    • (2007) FOSAD 2007 , vol.4677 , pp. 92-134
    • Erlingsson, U.1
  • 16
    • 84885890226 scopus 로고    scopus 로고
    • The PaX Team: Documentation for the pax project, http://pax.grsecurity. net/docs/pax.txt
  • 17
    • 77952351839 scopus 로고    scopus 로고
    • The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
    • ACM, New York
    • Shacham, H.: The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86). In: Proceedings of the 14th ACM conference on Computer and communications security, p. 561. ACM, New York (2007)
    • (2007) Proceedings of the 14th ACM Conference on Computer and Communications Security , pp. 561
    • Shacham, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.