메뉴 건너뛰기




Volumn , Issue , 2014, Pages

TrustLite: A security architecture for tiny embedded devices

Author keywords

[No Author keywords available]

Indexed keywords

FIRMWARE; HARDWARE; INTEROPERABILITY;

EID: 84900427392     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2592798.2592824     Document Type: Conference Paper
Times cited : (307)

References (53)
  • 6
    • 84900405768 scopus 로고    scopus 로고
    • Softer smartcards - usable cryptographic tokens with secure execution
    • International Financial Cryptography Association (IFCA), Springer
    • F. F. Brasser, S. Bugiel, A. Filyanov, A.-R. Sadeghi, and S. Schulz. Softer smartcards - usable cryptographic tokens with secure execution. In Financial Cryptography. International Financial Cryptography Association (IFCA), Springer, 2012.
    • (2012) Financial Cryptography
    • Brasser, F.F.1    Bugiel, S.2    Filyanov, A.3    Sadeghi, A.-R.4    Schulz, S.5
  • 10
    • 85084161786 scopus 로고    scopus 로고
    • Killing the myth of Cisco IOS diversity: Recent advances in reliable shellcode design
    • USENIX
    • A. Cui, J. Kataria, and S. J. Stolfo. Killing the myth of Cisco IOS diversity: recent advances in reliable shellcode design. In Workshop On Offensive Technologies (WOOT). USENIX, 2011.
    • (2011) Workshop on Offensive Technologies (WOOT)
    • Cui, A.1    Kataria, J.2    Stolfo, S.J.3
  • 21
    • 33845213039 scopus 로고    scopus 로고
    • Are virtual-machine monitors microkernels done right?
    • G. Heiser, V. Uhlig, and J. LeVasseur. Are virtual-machine monitors microkernels done right? SIGOPS Oper. Syst. Rev., 40(1):95-99, 2006.
    • (2006) SIGOPS Oper. Syst. Rev. , vol.40 , Issue.1 , pp. 95-99
    • Heiser, G.1    Uhlig, V.2    LeVasseur, J.3
  • 22
    • 84900396693 scopus 로고    scopus 로고
    • Infineon Technologies., v1.0
    • Infineon Technologies. XC238xE User's Manual, 2011. v1.0.
    • (2011) XC238xE User's Manual
  • 24
    • 85028170979 scopus 로고    scopus 로고
    • Establishing the genuinity of remote computer systems
    • USENIX
    • R. Kennell and L. H. Jamieson. Establishing the genuinity of remote computer systems. In USENIX Security Symposium. USENIX, 2003.
    • (2003) USENIX Security Symposium
    • Kennell, R.1    Jamieson, L.H.2
  • 27
    • 0000474763 scopus 로고    scopus 로고
    • Differential power analysis
    • International Association for Cryptologic Research, Springer
    • P. C. Kocher, J. Jaffe, and B. Jun. Differential power analysis. In Advances in Cryptology - CRYPTO '99. International Association for Cryptologic Research, Springer, 1999.
    • (1999) Advances in Cryptology - CRYPTO '99
    • Kocher, P.C.1    Jaffe, J.2    Jun, B.3
  • 37
    • 33846483949 scopus 로고    scopus 로고
    • Intel virtualization technology: Hardware support for efficient processor virtualization
    • G. Neiger, A. Santoni, F. Leung, D. Rodgers, and R. Uhlig. Intel Virtualization Technology: Hardware support for efficient processor virtualization. Intel Technology Journal, 10(3):167- 177, 2006.
    • (2006) Intel Technology Journal , vol.10 , Issue.3 , pp. 167-177
    • Neiger, G.1    Santoni, A.2    Leung, F.3    Rodgers, D.4    Uhlig, R.5
  • 42
    • 84880296077 scopus 로고    scopus 로고
    • Extreme scale computing
    • J. Rattner. Extreme scale computing. ISCA Keynote, 2012.
    • (2012) ISCA Keynote
    • Rattner, J.1
  • 49
    • 38549083620 scopus 로고    scopus 로고
    • Trusted Computing Group (TCG)
    • Trusted Computing Group (TCG). TCG Architecture Overview, 2004.
    • (2004) TCG Architecture Overview
  • 51
    • 84867570235 scopus 로고    scopus 로고
    • The state of embedded-device security (spoiler alert: It's bad)
    • IEEE
    • J. Viega and H. Thompson. The state of embedded-device security (spoiler alert: It's bad). Security Privacy, IEEE, 10(5):68-70, 2012.
    • (2012) Security Privacy , vol.10 , Issue.5 , pp. 68-70
    • Viega, J.1    Thompson, H.2
  • 52
    • 84900455713 scopus 로고    scopus 로고
    • The SCADA that didn't cry wolf - who's really attacking your ICS devices - part deux!
    • K. Wilhoit. The SCADA that didn't cry wolf - who's really attacking your ICS devices - part deux! Black Hat Briefings, 2013.
    • (2013) Black Hat Briefings
    • Wilhoit, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.